Ethical Hacking: File Inclusion
What you'll learn
- How to Hack a Server using LFI
- How Local File Inclusion vulnerability works
- How Remote File Inclusion vulnerability works
- How to Mitigate these vulnerabilities
- Kali Linux Live USB or Virtualbox image
- Some programming knowledge helps
In this course you will learn about Local File Inclusion (LFI), Remote File Inclusion (RFI) and other vulnerabilities that may exist in web apps. You will learn how to prevent them as a developer and how you can leverage them to hack into servers. The course contains examples hack, that you could try on your own home lab.
For this vulnerability to work, the website needs to have a file inclusion vulnerability. But, if it's present you might either hack the server directly or indirectly through another protocol like SSH or RDP. The course will also show you about the steps every hacker takes, regardless of what is the target. You'll learn how to scan for apps running on a server and how you might disclose if the target is running a Linux or Windows server.
If you are new to hacking, this course is for you. You'll be able to hack a server, given this vulnerability is present in the web app. It's a beginners course and you don't need any prior experience. No programming experience is needed, but we will go over a tiny bit of programming. However, as this is a hacking course the main focus is on that.
Who this course is for:
- Beginner Ethical Hackers
- Software Developers
Ethical Hacker with Software Development background. I first started programming long ago as a hobby and along the way learned many things. I've programmed in basic, c++, java and many other languages. I'm programming as a hobby. I've used a variety of operating systems and also database systems. I'm here to share my experience. Then I got into Ethical Hacking