Student Reviews
                
                    
                            
    
    
    
    
                    
                    ( 5 Of 5 )
                
                1 review
             
         
        
        
     
          
        
            
                
                    Video of From Local File Inclusion to Remote Shell    OSCP Video Course Prep in Web PenTesting course by Motasem Hamdan channel, video No. 2 free certified online                
            
            
                Cyber Security Certification Notes
https://shop.motasem-notes.net/collections/cyber-security-study-notes
 OR Certification Notes with Cheat Sheets
https://buymeacoffee.com/notescatalog/extras
 Cyber Security Notes Membership Access
https://buymeacoffee.com/notescatalog/membership
 Download FREE Cyber Security 101 Study Notes
https://buymeacoffee.com/notescatalog/e/290985
In this video walk-through, we covered a lab scenario using DVWA Lab to demonstrate and explain Local file inclusion vulnerability and the transition from LFI into remote shell. This video is useful for OSCO certification prep.
Receive Cyber Security Field, Certifications Notes and Special Training Videos 
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
More content on Local File Inclusion Vulnerability
https://motasem-notes.net/file-inclusion-vulnerability-explained-tryhackme-junior-penetration-tester/
 
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
Instagram
https://www.instagram.com/motasem.hamdan.official/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Instagram
https://www.instagram.com/mastermindstudynotes/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
0:00 - Introduction to Local File Inclusion (LFI)
1:15 - Understanding the Vulnerable Code
2:50 - File Inclusion and Input Sanitization
4:40 - Directory Traversal and Sensitive File Access
7:01 - Moving from File Inclusion to System Compromise
8:06 - Apache Log Poisoning for Code Injection
10:52 - Executing Code via Local File Inclusion
12:30 - Gaining Reverse Shell Access
15:30 - Protecting Against LFI Attacks
18:20 - Conclusion: Importance of Input Sanitization