Student Reviews
( 5 Of 5 )
1 review
Video of File Inclusion Vulnerability Explained TryHackMe Junior Penetration Tester OSCP in Web PenTesting course by Motasem Hamdan Cyber Security & Tech channel, video No. 31 free certified online
In this video walk-through, We covered local and remote file inclusion vulnerability. We also explained methods of bypassing filters. This was part of TryHackMe Junior Penetration Tester pathway. This video is useful for OSCO certification prep.
Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
Writeup
https://motasem-notes.net/file-inclusion-vulnerability-explained-tryhackme-junior-penetration-tester/
TryHackMe File Inclusion
https://tryhackme.com/room/fileinc
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
Instagram
https://www.instagram.com/mastermindstudynotes/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Instagram
https://www.instagram.com/mastermindstudynotes/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
0:00 - Introduction to File Inclusion Vulnerability
1:08 - Lab 1: Simple File Inclusion
3:17 - Lab 2: File Inclusion in the Includes Directory
6:48 - Lab 3: Bypassing Extensions with Null Bytes
9:58 - Lab 4: Function Vulnerabilities in File Inclusion
12:46 - Lab 6: Directory and File Path Manipulation
16:14 - Challenge 1: Capturing the First Flag
18:42 - Challenge 2: Bypassing Cookie Restrictions
23:22 - Challenge 3: Post Request File Inclusion
27:51 - Remote File Inclusion (RFI) Playground
31:01 - Gaining Remote Shell Access