@fhlipZero said:
scratch that - very much learned a thing
You have an article or something that you could share so I can learn this thing? Im stuck at the same exact spot and no amount of fuzzing I can think of is working. But im also not versed in XXX so im most likely missing something simple.
if you got the 2 files, then you should check out OWASP TOP 10 that helped me get it really helped.
I knew it was somethng simple - that helped a lot. I got user with it, now im just trying to actually get my shell spawned. Thank you
I’m completely lost. I have both of the files but I don’t see what that has to do with anything. I understand the two files relationship to one another but what do I do with that info? I’m out of ideas. Any help would be greatly appreciated. Thanks!
I was able to get a login for a database from a specific file, am I going down a rabbit hole with this? Something about a secure-file-priv option keeps me from using an exploit.
@sheeets said:
I was able to figure out how to read files from the server, but I can’t get any sort of RCE or relevant file for getting a shell. Any advice?
If you have LFI then your next best bet is to enumerate users. Also look at your original nmap scan and notice what services are running that you can use that LFI with to possibly get access.
@sheeets said:
I was able to get a login for a database from a specific file, am I going down a rabbit hole with this? Something about a secure-file-priv option keeps me from using an exploit.
Your are on the right track just think how u can get the creds out of that application
@sheeets said:
I was able to figure out how to read files from the server, but I can’t get any sort of RCE or relevant file for getting a shell. Any advice?
Look at your nmap scan what services are running and how they work then use the LFI
I need help! I got the two files as well, but have no clue where to start. I read through the top ten, but not really anything stands out, besides one thing, but not sure. PLEASE HELP.
I have managed to use the 2 files to execute a command, but I cannot inject anything extra?? I have tried numerous things from OWASP, etc. I am unsure as to how I can gain access. If anyone can PM me some good places to read up I would be most grateful.