đŸ“Œ Challenge Info
- Category: Path Traversal
- Name: Local File Inclusion
- Link: Challenge
đŸ“– Description
this lab wants us to get into the admin page and see it via local file inclusion vulnerability.
đŸ’¡Solution
- so let’s begin with opening the url

- we can navigate between the files as we want with no restrictions.
- there is a parameter appeared in the url namedÂ
files that gets the content of the Directories , so folder sysadmin contains file named index.html.

- when clicking on the index.html another parameter appears calledÂ
f that reads the content of the file .
<http://challenge01.root-me.org/web-serveur/ch16/?files=reseau&f=index.html>
- all these folders and files are really waste of time nothing important here , but there is an admin link on the right let’s see it.

- but as we see it’s protected and we don’t have credentials , so let’s get back to the home page .
- and since we are testing for an LFI vulnerability now let’s try to put ../ in the files parameter .

- a new files appeared so let’s try to read the admin file with the f parameter .