Using the FIMAP tool for file inclusion attacks (RFI/LFI)
In the very first recipe, the Burp also identified the file path travel vulnerability. In this recipe, we learn how to use Fimap to exploit the file path traversal vulnerability.
Fimap is a Python tool that can help in finding, preparing, auditing and finally exploiting local and remote file inclusion bugs in web applications automatically.
Getting ready
To step through this recipe, you will need the following:
- Kali Linux running on Oracle Virtualbox/VMware
- Docker running on Kali Linux
- Vulnerable Web Application Docker container
- An Internet connection
How to do it...
For this recipe, you need to perform the following steps:
- Open the browser and navigate to
http:/dvwa.hackhunt.com/dvwa
and log in with the default credentials. Click onFile Inclusion
from the left-hand side menu, as shown in the following screenshot:
- Open the terminal and type
fimap
, which will show the version and author information, as shown in the following screenshot...