Harshal Shahdelvingwithharshal.hashnode.dev·Sep 17, 2024LFI and RFI: A Deep Dive with Real-World ExamplesLFI (Local File Inclusion) and RFI (Remote File Inclusion) are two common web application vulnerabilities that allow attackers to include files on the server, potentially leading to unauthorized access, code execution, or data disclosure. LFI (Local ...Discuss·75 readsFortify and Defend: Navigating the Cybersecurity Landscapecode security
Reza Rashidiblog.redteamguides.com·Jul 25, 2024RedTeam Story #1: XSS, LFI, LogrotateMITRE ATT&CK Techniques and Tactics Tactic: Reconnaissance Technique ID: T1595 Attack Context Reconnaissance is the phase where the attacker gathers information about the target system. This phase is critical for understanding the system's struct...Discuss·1.3K readsredteamstory
Cxnsxlecxnsxle.hashnode.dev·Jul 26, 2023Log Poisoning VulnerabilityWhat is Log Poisoning? Log poisoning is a cybersecurity attack technique aimed at manipulating or polluting the data collected in log files within a computer system or network. Log files are used to record various activities and events on a system, s...Discuss·1 like·60 readsowasp
Cxnsxlecxnsxle.hashnode.dev·Jul 19, 2023LFI VulnerabilityWhat is LFI? Local File Inclusion (LFI) is an attack technique in which we as attackers trick a web application into either running or exposing files on a web server. LFI attacks can expose sensitive information, and in severe cases, they can lead to...Discuss·36 readshacking