تقييمات الطلاب
( 5 من 5 )
١ تقييمات
فيديو شرح From Local File Inclusion to Remote Shell OSCP Video Course Prep ضمن كورس اختبار اختراق المواقع شرح قناة Motasem Hamdan Cyber Security & Tech، الفديو رقم 73 مجانى معتمد اونلاين
In this video walk-through, we covered a lab scenario using DVWA Lab to demonstrate and explain Local file inclusion vulnerability and the transition from LFI into remote shell. This video is useful for OSCO certification prep.
Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
More content on Local File Inclusion Vulnerability
https://motasem-notes.net/file-inclusion-vulnerability-explained-tryhackme-junior-penetration-tester/
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
Instagram
https://www.instagram.com/mastermindstudynotes/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Instagram
https://www.instagram.com/mastermindstudynotes/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
0:00 - Introduction to Local File Inclusion (LFI)
1:15 - Understanding the Vulnerable Code
2:50 - File Inclusion and Input Sanitization
4:40 - Directory Traversal and Sensitive File Access
7:01 - Moving from File Inclusion to System Compromise
8:06 - Apache Log Poisoning for Code Injection
10:52 - Executing Code via Local File Inclusion
12:30 - Gaining Reverse Shell Access
15:30 - Protecting Against LFI Attacks
18:20 - Conclusion: Importance of Input Sanitization