πFile Inclusion
Complete guide covering Local File Inclusion (LFI), Remote File Inclusion (RFI), and advanced file inclusion techniques from HTB Academy's File Inclusion module.
π Table of Contents
Core Techniques
Basic LFI Techniques - Fundamentals, path traversal, common files, and HTB Academy labs
Advanced Bypasses & PHP Filters - Filter bypasses, PHP filters, and source code disclosure
PHP Wrappers for RCE - Data, Input, and Expect wrappers for remote code execution
Remote File Inclusion (RFI) - HTTP, FTP, and SMB protocols for external file inclusion
Advanced Topics
File Upload + LFI Combinations - Malicious image uploads, zip/phar wrappers
Log Poisoning Techniques - Session, Apache, SSH, Mail, and FTP log poisoning
Automated Scanning & Tools - Parameter discovery, wordlist fuzzing, automated tools
Prevention & Hardening - Secure coding, server hardening, WAF protection
Skills Assessment Walkthrough - Complete HTB Academy capstone challenge
π― Quick Reference
Essential LFI Payloads
PHP Wrappers for RCE
RFI Protocols
Log Poisoning Locations
π¬ HTB Academy Labs Coverage
All guides include complete solutions for HTB Academy File Inclusion module labs:
β
Completed Labs
Basic LFI Lab - Finding users and reading flags
LFI Bypasses Lab - Non-recursive and encoding bypasses
PHP Filters Lab - Source code disclosure techniques
PHP Wrappers Lab - RCE via data, input, and expect wrappers
RFI Lab - HTTP, FTP, and SMB remote file inclusion
File Upload + LFI Lab - Malicious image uploads and wrapper techniques
Log Poisoning Lab - Session poisoning and Apache log injection
Automated Scanning Lab - Parameter discovery and fuzzing techniques
Prevention Lab - PHP configuration and security hardening
Skills Assessment - Multi-technique exploitation chain
π Tools & Resources
Manual Testing Tools
Automated Tools
ffuf - Parameter and payload fuzzing
LFiFreak - Automated LFI exploitation
liffy - LFI exploitation tool
kadimus - LFI/RFI scanner and exploiter
Burp Suite - Parameter discovery and testing
Wordlists
/opt/useful/SecLists/Fuzzing/LFI/LFI-Jhaddix.txt/opt/useful/SecLists/Fuzzing/LFI/LFI-gracefulsecurity-linux.txt/opt/useful/SecLists/Discovery/Web-Content/burp-parameter-names.txt
π Attack Methodology
1. Discovery Phase
2. Exploitation Phase
3. Post-Exploitation
π Defense Mechanisms
Secure Coding Practices
Input validation and sanitization
Whitelist allowed files/paths
Use
basename()for file operationsAvoid user input in file functions
Server Hardening
WAF Protection
ModSecurity rules for LFI detection
Path traversal pattern blocking
PHP wrapper filtering
Null byte injection prevention
π Difficulty Progression
π’ Beginner β Basic LFI Techniques π‘ Intermediate β Advanced Bypasses β PHP Wrappers π Advanced β RFI β Log Poisoning π΄ Expert β Automated Scanning β Skills Assessment
This comprehensive file inclusion guide covers 100% of HTB Academy's File Inclusion module, providing practical knowledge for both offensive security testing and defensive implementation.
Last updated