Go offline with the Player FM app!
Ep. 9 – Directory Traversal & LFI: From File Leaks to Full Server Crash
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on October 30, 2025 14:43 ()
What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 485690922 series 3643227
One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server.
In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single trusted path.
Chapters:
00:00 - INTRO
01:07 - FINDING #1 - Server File Theft with Directory Traversal
09:23 - FINDING #2 - From File Inclusion to RCE via Log Poisoning
16:20 - FINDING #3 - LFI to Server Crash
24:09 - OUTRO
Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us → [email protected]
🔗 Podcast Website → Website Link
Chapters
1. INTRO (00:00:00)
2. FINDING #1 - Server File Theft with Directory Traversal (00:01:07)
3. FINDING #2 - From File Inclusion to RCE via Log Poisoning (00:09:23)
4. FINDING #3 - LFI to Server Crash (00:16:20)
5. OUTRO (00:24:09)
14 episodes
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on October 30, 2025 14:43 ()
What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 485690922 series 3643227
One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server.
In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single trusted path.
Chapters:
00:00 - INTRO
01:07 - FINDING #1 - Server File Theft with Directory Traversal
09:23 - FINDING #2 - From File Inclusion to RCE via Log Poisoning
16:20 - FINDING #3 - LFI to Server Crash
24:09 - OUTRO
Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us → [email protected]
🔗 Podcast Website → Website Link
Chapters
1. INTRO (00:00:00)
2. FINDING #1 - Server File Theft with Directory Traversal (00:01:07)
3. FINDING #2 - From File Inclusion to RCE via Log Poisoning (00:09:23)
4. FINDING #3 - LFI to Server Crash (00:16:20)
5. OUTRO (00:24:09)
14 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.