/operation-file-hunt

A vulnerable lab for understanding difference between LFI and File Retrieval

Primary LanguagePHP

Operation-File-Hunt

Operation-File-Hunt is an educational lab setup for learning about file inclusion vulnerabilities. This lab focuses on Local File Inclusion (LFI) and file retrieval issues, offering practical examples and scenarios to help users understand how these vulnerabilities work and how they can be exploited.

Installation

  1. Clone the repository:
git clone https://github.com/dr34mhacks/operation-file-hunt.git
  1. Navigate to the project directory:
cd operation-file-hunt
  1. Running the application:
sudo bash runme.sh
image

This will start a local server, and you can access the application by navigating to http://localhost:8085 in your web browser.

Homepage UI

image

Easy Bonus Challenge

image

Learning Objectives

  • Understand File Inclusion Vulnerabilities: Gain knowledge about Local File Inclusion (LFI) and file retrieval issues, including their causes and impacts.

  • Explore Exploitation Techniques: Practice exploiting LFI vulnerabilities to access restricted files and learn how to chain these vulnerabilities for advanced attacks.

  • Mitigate Vulnerabilities: Learn best practices for securing applications against LFI and file retrieval issues, including input validation and secure file handling.

  • Develop Practical Skills: Gain hands-on experience with real-world mimic scenarios to enhance problem-solving skills in addressing and mitigating file inclusion vulnerabilities.

Security Disclaimer

This application is intended for educational purposes only. Do not use these techniques on systems without explicit permission. Always practice ethical hacking and responsible disclosure.

Contributing

Feel free to submit issues or pull requests for enhancements or bug fixes. Contributions are welcome!

Blog

Happy Hacking! 🛡️🔍