Penetration Testing - Local File Inclusion (LFI) watch more videos at www.tutorialspoint.com/videot... Lecture By: Mr. Sharad Kumar, Tutorials Point India Private Limited
Пікірлер: 19
@TutorialsPoint_4 ай бұрын
Get Certified in Web Application Penetration: www.tutorialspoint.com/web-application-penetration-online-training/index.asp Use coupon ""KZfaq12"" to get “FLAT 12%’’ OFF at Checkout.
@suchitrawalke44995 жыл бұрын
Thank you so much...you make it so simple to understand.
@sinanajarha67123 жыл бұрын
I don't know you believe or not, but I got PWK materials and I have read LFI vulnerability section several times but I have not understood it, but this video is much better than PWK PDF and videos.
@mohitdemla32404 жыл бұрын
thumbs up from Australia. Well explained, Bud
@AmanKhan-bw3rt3 жыл бұрын
You r very good teacher
@krishnakumar.r65519 ай бұрын
Nice explanation. Thanks
@viratgajjar78602 жыл бұрын
Thank you you explained it in very easy way.
@CesarPerez-cs5pf3 жыл бұрын
very well explained :-) thanks
@GolitePlays3 жыл бұрын
who else is here because they mispelled lofi
@envyy55823 жыл бұрын
Brrooo🤣🤣😂😂😭😂😂
@udhayn8222 жыл бұрын
very easy to understand 😃
@monicamanilal58252 жыл бұрын
Thank you for the explanation. May you please explain the difference between LFI and directory traversal? Thanks
@qusayeyad7606 ай бұрын
I dont know if am late or note but here is the diff between LFI and directory traversal. Directory Traversal is a vulnerability for READING the document, the LFI is a vulnerability for EXECUTING the document. I hope you still alive since its been 2 years lol 😂
@sahib8482 жыл бұрын
25 lac subs? 😧 And views 23k . How?.. It's real subs Or not
@likeapple19294 жыл бұрын
Hi Im wondering if the server sanitize inputs, for example etc is filtered, how can we perform LFI then?
@farzimocha94993 жыл бұрын
won't be able to then
@h0tPlug1n2 жыл бұрын
We can try encrypting the word etc or any other method like encoding in ascii
@aneeltripathy74202 жыл бұрын
only index.php has this sorts of vulnerability?
@h0tPlug1n2 жыл бұрын
No. We need to find for GET parameters either directly in the URL or indirectly in the BURP to inject these.