Friday, 13 May 2011
Local File Inclusion to Remote Command Execution using SSH
Log poisoning has been used for years to upgrade local file inclusion vulnerabilities to remote command execution. In most cases, web server logs are used to execute such an attack. Most admins have become wise to the technique and do a decent job of preventing this. However, an equal amount of attention is not always paid to authentication logs. I was recently attempting to exploit
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment