Site Logo
Niklas Heringer - Cybersecurity Blog

Lfi

  • From LFI to RCE: Exploiting File Inclusion Like a Pro

    Posted on 20 mins

    A hands-on deep dive into exploiting file inclusion vulnerabilities — from simple LFI to full RCE using session poisoning, log injection, and PHP wrappers.
    From LFI to RCE: Exploiting File Inclusion Like a Pro
  • Intro to File Inclusion

    Posted on 8 mins

    An in-depth and hands-on walkthrough on spotting and exploiting Local File Inclusion (LFI) — from classic payloads to modern bypasses, straight from HTB Academy labs.
    Intro to File Inclusion