πŸ§‘β€πŸ«
My Penetration Test Guide
search
⌘Ctrlk
GitBook Assistant
GitBook Assistant
Working...Thinking...
GitBook Assistant
Good afternoon

I'm here to help you with the docs.

⌘Ctrli
AI Based on your contextquestion-circle
πŸ§‘β€πŸ«
My Penetration Test Guide
  • Getting Started
    • Introduction to Penetration Testing
    • Prerequisites & Skills
    • Legal & Ethical Foundation
  • Methodology & Planning
    • Testing Methodologies
    • Testing Frameworks
    • Pre-Engagement Activities
  • Reconnaissance & Information Gathering
    • Passive Reconnaissance
    • Active Reconnaissance
  • Active Directory
    • Testing Approach
    • Attack Paths & Priorities
    • Active Directory Overview
    • Active Directory Enumeration
    • Authentication Attacks
    • Relay & Poisoning Attacks
    • Lateral Movement
    • Advanced AD Attacks
  • Web-based Attacks
    • Web Application Methodology
    • Web Reconnaissance
    • Google Dorking
    • Input Validation Testing
    • File Handling & Execution
      • File upload vulnerabilities
      • Path traversal
      • Local File Inclusion (LFI)
      • Remote File Inclusion (RFI)
    • API Security Testing
  • Wireless Attacks
    • Aircrack-ng Suite
    • Cracking Authentication Hashes
    • Rogue Access Point
    • WPA Enterprise
    • Captive Portals
  • Privilege Escalation
    • Privilege Escalation Fundamentals
    • Windows Privilege Escalation
    • Linux Privilege Escalation
    • Automated Enumeration Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Web-based Attacks

File Handling & Execution

File upload vulnerabilitieschevron-rightPath traversalchevron-rightLocal File Inclusion (LFI)chevron-rightRemote File Inclusion (RFI)chevron-right
PreviousHTTP Request Smugglingchevron-leftNextFile upload vulnerabilitieschevron-right

Was this helpful?

Was this helpful?