Local File Inclusion Enumeration (PoC)
Almost whole system enumeration when target is vulnerable to LFI.
Local File Inclusion Enumerator v1.0 by 0bfxgh0st*
Usage python3 lfienum <url> <option>
Options:
-X POST/GET Request method
--pids <n> Bruteforce process id's from 0 to <n> (/proc/<n>/cmdline) [default is set to 999]
--pid <n> Show single process id
--fd <n> Bruteforce file descriptors from 0 to <n> (/proc/self/fd/<n>) [default is set to 30]
--wrapper <file> Extract/decode hidden file using a wrapper (php://filter/convert.base64-encode/resource=)
-w, --wordlist <wordlist> Use a custom wordlist
-k, --key Extract id_rsa key
-h, --help Show help panel
-ah, --advanced-help Show advanced help panel
-v, -vvv Show package info
-ou, --only-url Dump urls only
-x1 Use XCF_A function print all text between tags (default)
-x2 Use XCF_B function print all text that isn't between any tag
-x3 Use XCF_C function print content between specific tag
-x4 Use XCF_D function delete all content inside <html> and </html> tags
--exclude <string> Exclude responses that contains given string
Enumeration modes:
--data-mode <key name> Data mode (LFI enumeration via data key)
--cookie-mode <key name> Cookie mode (LFI enumeration via cookie key)
Examples:
python3 lfienum "http://ghost.server/index.php?page="
python3 lfienum "http://ghost.server/" --cookie-mode session
python3 lfienum "http://ghost.server/index.js" --data-mode file