[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] LFIMAP
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] LFIMAP
- From: netinfinity <netinfinity.securitylab@xxxxxxxxx>
- Date: Wed, 1 Dec 2010 21:07:52 +0100
And your archives sucks also. Please use standard ones.
On Wed, Dec 1, 2010 at 12:44 PM, Augusto Pereyra <aepereyra@xxxxxxxxx>wrote:
> Hi i'd like to share with the community this tool developed by me.
> This tool is very usefull when you find some site with the
> vulnerability called local file include.
> This is a list of functionalities of the tool:
>
> Can find automatically the root of the file system.
> Detect default files outside of the web folder
> It will try detect passwords inside the files
> Support basic authentication
> Can use null byte to bypass some controls
> Write a report of the scan to a file
>
> The tool can be downloaded from:
> http://code.google.com/p/lfimap/downloads/list
>
> Please download the last version
>
> My English sucks, sorry
> Thanks to www.artsweb.com.ar
> Best regard
> Augusto Pereyra
>
> ------------------------------------------------------------------------
> This list is sponsored by: Information Assurance Certification Review Board
>
> Prove to peers and potential employers without a doubt that you can
> actually do a proper penetration test. IACRB CPT and CEPT certs require a
> full practical examination in order to become certified.
>
> http://www.iacertification.org
> ------------------------------------------------------------------------
>
>
--
www.google.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/