RFI - Remote File Inclusion
Last updated
Last updated
See PG Practice SLORT for uploading a php reverse shell that executes simultaneously in windows!
Less common than LFI because it has to be configured to be able to call remotely, however ALWAYS CHECK IT if you found a LFI.
Test payload:
Result would be an incoming connection on a nc listener.
Exploiting:
Host the file with malicious php code:
Call it with the RFI payload:
Tricks:
Add null byte to terminate string and bypass upload restriction of filetype - %00
Append a ? to the end of the payload to continue the string as if there isn't a payload
If http is excluded, try SMB link instead