Vai offline con l'app Player FM !
Ep. 9 – Directory Traversal & LFI: From File Leaks to Full Server Crash
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on October 30, 2025 14:43 ()
What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 485690922 series 3643227
One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server.
In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single trusted path.
Chapters:
00:00 - INTRO
01:07 - FINDING #1 - Server File Theft with Directory Traversal
09:23 - FINDING #2 - From File Inclusion to RCE via Log Poisoning
16:20 - FINDING #3 - LFI to Server Crash
24:09 - OUTRO
Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us → [email protected]
🔗 Podcast Website → Website Link
Capitoli
1. INTRO (00:00:00)
2. FINDING #1 - Server File Theft with Directory Traversal (00:01:07)
3. FINDING #2 - From File Inclusion to RCE via Log Poisoning (00:09:23)
4. FINDING #3 - LFI to Server Crash (00:16:20)
5. OUTRO (00:24:09)
14 episodi
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on October 30, 2025 14:43 ()
What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 485690922 series 3643227
One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server.
In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single trusted path.
Chapters:
00:00 - INTRO
01:07 - FINDING #1 - Server File Theft with Directory Traversal
09:23 - FINDING #2 - From File Inclusion to RCE via Log Poisoning
16:20 - FINDING #3 - LFI to Server Crash
24:09 - OUTRO
Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us → [email protected]
🔗 Podcast Website → Website Link
Capitoli
1. INTRO (00:00:00)
2. FINDING #1 - Server File Theft with Directory Traversal (00:01:07)
3. FINDING #2 - From File Inclusion to RCE via Log Poisoning (00:09:23)
4. FINDING #3 - LFI to Server Crash (00:16:20)
5. OUTRO (00:24:09)
14 episodi
Tutti gli episodi
×Benvenuto su Player FM!
Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.