View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0001601 | Kali Linux | Feature Requests | public | 2014-07-23 23:26 | 2014-07-24 00:43 |
| Reporter | jaimechiquita111 | Assigned To | dookie | ||
| Priority | normal | Severity | feature | Reproducibility | N/A |
| Status | closed | Resolution | duplicate | ||
| Platform | x86 | OS | Kali | OS Version | 1.0 |
| Product Version | 1.0.8 | ||||
| Summary | 0001601: Liffy - Local File Inclusion Exploitation Tool | ||||
| Description | https://github.com/rotlogix/liffy The article is the following: What is Liffy ? Liffy is a tool written in Python designed to exploit local file inclusion vulnerabilities using three different techniques that will get you a working web shell. The first two make use of the built-in PHP wrappers php://input and data://. The third makes use of the process control extension called 'expect'. Current features include: Liffy requires the following libraries: requests, argparse, blessings, urlparse Or you can simply spawn python's SimpleHTTPServer in /tmp on port 8000. Further development of the tool will eventually include spawning a built-in web server in order to download, for now you can adjust the location and port in the source code for your needs. These can be changed in core.py under the execute functions. source: http://www.ehacking.net/2014/07/liffy-local-file-inclusion-exploitation.html | ||||
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2014-07-23 23:26 | jaimechiquita111 | New Issue | |
| 2014-07-24 00:43 | dookie | Note Added: 0002362 | |
| 2014-07-24 00:43 | dookie | Status | new => closed |
| 2014-07-24 00:43 | dookie | Assigned To | => dookie |
| 2014-07-24 00:43 | dookie | Resolution | open => duplicate |