From 59d0020c867fe173fec5d0015b1130785c8a75b1 Mon Sep 17 00:00:00 2001 From: Milan Veljkovic Date: Mon, 19 Nov 2018 12:45:01 +0100 Subject: [PATCH] Update README.md --- File Inclusion - Path Traversal/README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/File Inclusion - Path Traversal/README.md b/File Inclusion - Path Traversal/README.md index e0cccdf..2d1c2d9 100644 --- a/File Inclusion - Path Traversal/README.md +++ b/File Inclusion - Path Traversal/README.md @@ -186,7 +186,7 @@ Specify your payload in the POST parameters ```powershell http://example.com/index.php?page=php://input -POST DATA: +POST DATA: ``` ### Wrapper phar:// @@ -340,4 +340,4 @@ login=1&user=admin&pass=password&lang=/../../../../../../../../../var/lib/php5/s * [Чтение файлов => unserialize !](https://rdot.org/forum/showthread.php?t=4379) * [New PHP Exploitation Technique - 14 Aug 2018 by Dr. Johannes Dahse](https://blog.ripstech.com/2018/new-php-exploitation-technique/) * [It's-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It, Sam Thomas](https://github.com/s-n-t/presentations/blob/master/us-18-Thomas-It's-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf) -* [Local file inclusion mini list - Penetrate.io](https://penetrate.io/2014/09/25/local-file-inclusion-mini-list/) \ No newline at end of file +* [Local file inclusion mini list - Penetrate.io](https://penetrate.io/2014/09/25/local-file-inclusion-mini-list/)