<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Local File Inclusion on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/local-file-inclusion/</link><description>Recent content in Local File Inclusion on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 01 Apr 2025 13:07:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/local-file-inclusion/index.xml" rel="self" type="application/rss+xml"/><item><title>DVR4 Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_dvr4/</link><pubDate>Tue, 01 Apr 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_dvr4/</guid><description>&lt;h2 id="dvr4-offsec-walkthrough">
 DVR4 Offsec Walkthrough
 &lt;a class="heading-link" href="#dvr4-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_dvr4/Picture23.png" alt="image">&lt;/p>
&lt;h3 id="lfi-vulnerability">
 LFI Vulnerability
 &lt;a class="heading-link" href="#lfi-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>Local File Inclusion (LFI) is a security vulnerability in web applications that allows an attacker to access files stored on the server. This failure occurs when an applicationconstructs file paths based on user input without properly validating its contents. As a result, an attacker can manipulate those paths to read sensitive system files and, in some cases, execute malicious code.&lt;/p></description></item></channel></rss>