To access material, start machines and answer questions login.
What is File inclusion?
This room aims to equip you with the essential knowledge to exploit file inclusion vulnerabilities, including Local File Inclusion (), Remote File Inclusion (), and directory traversal. Also, we will discuss the risk of these vulnerabilities if they're found and the required remediation. We provide some practical examples of each vulnerability as well as hands-on challenges.
In some scenarios, web applications are written to request access to files on a given system, including images, static text, and so on via parameters. Parameters are query parameter strings attached to the URL that could be used to retrieve data or perform actions based on user input. The following diagram breaks down the essential parts of a URL.

For example, parameters are used with Google searching, where GET requests pass user input into the search engine. https://www.google.com/search?q=TryHackMe. If you are not familiar with the topic, you can view the How The Web Works module to understand the concept.
Let's discuss a scenario where a user requests to access files from a webserver. First, the user sends an request to the webserver that includes a file to display. For example, if a user wants to access and display their CV within the web application, the request may look as follows, ://webapp./get.?file=userCV.pdf, where the file is the parameter and the userCV.pdf, is the required file to access.

Ready to learn Cyber Security?
The File Inclusion room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
