How to perform SSH Log Poisoning through LFI to exploit a web server?

It is important to get to know a great method to exploit a web server which essentially suffers from local file inclusion (LFI). Let’s assume we are working on a Metasploitable¬†2 target and the operating system to run the attack is Kali Linux. The following steps explain how one can perform this process on Kali … Continue reading How to perform SSH Log Poisoning through LFI to exploit a web server?