File Inclusion | TryHackMe Write-up | Farros
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内。首先,我需要仔细阅读文章内容,理解主要信息。文章看起来是关于TryHackMe平台上的一个房间,主题是文件包含漏洞,包括LFI、RFI和目录遍历。作者写了一个write-up,帮助其他人学习网络安全。 用户的要求很明确:用中文总结,不超过100字,不需要特定的开头。所以我要抓住关键点:文章介绍的是文件包含漏洞,提到了LFI、RFI和目录遍历,这些漏洞常见于PHP应用中,由于输入验证不足导致。攻击者可以利用这些漏洞泄露敏感数据或执行远程命令。 接下来,我需要确保语言简洁明了,控制在100字以内。可能的结构是先点明主题和漏洞类型,然后说明原因和后果。这样既全面又简洁。 最后检查一下是否符合要求:没有使用“文章内容总结”之类的开头,直接描述内容。确保没有遗漏重要信息,并且用词准确。 </think> 文章介绍File Inclusion漏洞(包括LFI、RFI和目录遍历),常见于PHP应用中因输入验证不足导致的攻击风险,并指导如何通过TryHackMe平台部署虚拟机进行实践学习。 2026-3-14 05:3:37 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Mochammad Farros Fatchur Roji

Non-members are welcome to access the full story here.

This is my write-up for the TryHackMe room on File Inclusion ↗ . Written in 2026, I hope this write-up helps others learn and practice cybersecurity.

Press enter or click to view image in full size

Task 1: Introduction

This section introduces File Inclusion vulnerabilities, specifically Local File Inclusion (LFI), Remote File Inclusion (RFI), and Directory Traversal. These vulnerabilities typically occur in web applications (often written in PHP) due to poor input validation, allowing users to manipulate URL parameters. If exploited, attackers can leak sensitive data or achieve Remote Command Execution (RCE).

Let’s continue to the next section to deploy the attached VM.

No answer needed

Task 2: Deploy the VM

Instructions are provided to deploy the target virtual machine. You need to connect to the TryHackMe network via OpenVPN or use the in-browser AttackBox to access the machine’s IP address and view the vulnerable web application.

Once you’ve deployed the VM, please wait a few minutes for the webserver to start, then progress to the next section!

No answer needed

Task 3: Path Traversal


文章来源: https://infosecwriteups.com/file-inclusion-tryhackme-write-up-farros-4d5927909ac8?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh