You’ll find this vm here : https://www.vulnhub.com/entry/black-widow-1,637/
Port Scan
Directory Scan
Directory Scan
/company
Find the Get parameter
Wfuzz - LFI Path Test
-
So the valid path for LFI is
../../../../../../../../../../../../../../
-
Note
If you don’t find the log file at once with the below list, maybe you broke something in the Virtual Machine.
So you need to reimport
the vm.
Finding the wordlist
Wfuzz - Log Files
Log poisoning to RCE through User Agent
- Burpsuite
- Copy the following request to the Burpsuite repeater
1 |
|
Confirm RCE
Reverse Shell
1 |
|
- Browser
1 |
|
- Listener
Searching for user password
- Credentials
viper
:?V1p3r2020!?
User
Linux Capabilities
Root
- Download the arsenic binary
- Strings
- Perl