Automated Scanning & Tools

Overview

Automated tools and techniques for discovering LFI vulnerabilities and escalating them efficiently across large applications and networks.


Parameter Discovery & Fuzzing

Hidden GET/POST Parameter Discovery

Using ffuf for Parameter Fuzzing:

# Discover hidden GET parameters
ffuf -w /opt/useful/SecLists/Discovery/Web-Content/burp-parameter-names.txt:FUZZ \
     -u "http://target.com/index.php?FUZZ=test" \
     -mc 200 \
     -fs 0

# Discover POST parameters
ffuf -w burp-parameter-names.txt:FUZZ \
     -X POST \
     -d "FUZZ=test" \
     -u "http://target.com/index.php" \
     -mc 200

HTB Academy Lab Example:


LFI Wordlist Fuzzing

Comprehensive LFI Testing

Basic LFI Fuzzing:

Multi-Stage Discovery:


Server File Discovery

Webroot and Configuration File Discovery

Common Configuration Files:


Automated LFI Tools

Professional LFI Exploitation Tools

LFISuite:

liffy:

kadimus:


HTB Academy Automated Scanning Lab

Complete 4-Stage Solution

Target: 83.136.254.199:58743 Objective: Use automated tools to find parameters, test LFI, and extract flag

Stage 1: Parameter Discovery

Stage 2: LFI Payload Testing

Stage 3: Filter and Identify Working Payloads

Stage 4: Flag Extraction


Custom Automation Scripts

Advanced Fuzzing Techniques

Multi-Parameter Testing:


[Content continues with more tools and techniques...]

This guide covers automated scanning techniques from HTB Academy's File Inclusion module.

Last updated