Skip to content

0bfxgh0st/lfienum

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 

Repository files navigation

Local File Inclusion Enumeration (PoC)

Almost whole system enumeration when target is vulnerable to LFI.

Local File Inclusion Enumerator v1.0 by 0bfxgh0st*
Usage python3 lfienum <url> <option>

Options:

    -X POST/GET                   Request method

    --pids <n>                    Bruteforce process id's from 0 to <n> (/proc/<n>/cmdline) [default is set to 999]
    --pid <n>                     Show single process id
    --fd <n>                      Bruteforce file descriptors from 0 to <n> (/proc/self/fd/<n>) [default is set to 30]
    --wrapper <file>              Extract/decode hidden file using a wrapper (php://filter/convert.base64-encode/resource=)
    -w,  --wordlist <wordlist>    Use a custom wordlist
    -k,  --key                    Extract id_rsa key

    -h,  --help                   Show help panel
    -ah, --advanced-help          Show advanced help panel

    -v,  -vvv                     Show package info
    -ou, --only-url               Dump urls only

    -x1                           Use XCF_A function print all text between tags (default)
    -x2                           Use XCF_B function print all text that isn't between any tag
    -x3                           Use XCF_C function print content between specific tag
    -x4                           Use XCF_D function delete all content inside <html> and </html> tags
    --exclude <string>            Exclude responses that contains given string

Enumeration modes:

    --data-mode <key name>        Data mode (LFI enumeration via data key)
    --cookie-mode <key name>      Cookie mode (LFI enumeration via cookie key)

Examples:

    python3 lfienum "http://ghost.server/index.php?page="
    python3 lfienum "http://ghost.server/" --cookie-mode session
    python3 lfienum "http://ghost.server/index.js" --data-mode file