Scenario

The company INLANEFREIGHT has contracted you to perform a web application assessment against one of their public-facing websites. They have been through many assessments in the past but have added some functionality in a hurry and are particularly concerned about the file inclusion path traversal vulnerabilities.

You’re provided an IP address - find web vulnerabilities pertaining to File Inclusions and submit the flag.

Assess the web application and use a variety of techniques to gain remote code execution and find a flag in the / root directory of the file system. Submit the contents of the flag as your answer.

Reconnaissance

Untitled

Untitled

Untitled

Things of Note after basic recon: