Local File Inclusion [ Post-Exploitation ]
I am curious what kind of sensitive files should I look for on a Windows server which is vulnerable to LFI compared to Linux?
I mean the first file or common files which a pentester or an unauthorized user will go for?
I a… Continue reading Local File Inclusion [ Post-Exploitation ]