<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Rfi on Welcome to noobsec</title>
    <link>https://www.noobsec.net/tags/rfi/</link>
    <description>Recent content in Rfi on Welcome to noobsec</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Mon, 29 Jun 2020 21:44:39 +0000</lastBuildDate><atom:link href="https://www.noobsec.net/tags/rfi/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>File Inclusion</title>
      <link>https://www.noobsec.net/file-inclusion/</link>
      <pubDate>Mon, 29 Jun 2020 21:44:39 +0000</pubDate>
      
      <guid>https://www.noobsec.net/file-inclusion/</guid>
      <description>&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;file-inclusion&#34; --&gt;

&lt;h1 class=&#34;header-anchor-wrapper&#34;&gt;File Inclusion
  &lt;a href=&#34;#file-inclusion&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h1&gt;

&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;introduction&#34; --&gt;

&lt;h2 class=&#34;header-anchor-wrapper&#34;&gt;Introduction
  &lt;a href=&#34;#introduction&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;File inclusion vulnerabilities are of two types: &lt;strong&gt;Remote File Inclusion (RFI)&lt;/strong&gt; and &lt;strong&gt;Local File Inclusion (LFI)&lt;/strong&gt;.
&lt;strong&gt;RFI&lt;/strong&gt; is said to be present when a web application allows remote users to load and execute a remote file on the server.
&lt;strong&gt;LFI&lt;/strong&gt; is said to be present when a web application allows remote users to load any pre-existing file and execute it on the server.&lt;/p&gt;</description>
    </item>
    
  </channel>
</rss>