Post

Lo-Fi - TryHackMe Writeup

Want to hear some lo-fi beats, to relax or study to? We’ve got you covered!

Lo-Fi - TryHackMe Writeup

Want to hear some lo-fi beats, to relax or study to? We’ve got you covered!


Lo-Fi TryHackMe Writeup

Want to hear some lo-fi beats, to relax or study to? We’ve got you covered!

Room: https://tryhackme.com/room/lofiimage

Overview

This room focuses on Local File Inclusion (LFI) and path traversal vulnerabilities. Below is a summary of my process and findings while exploiting the target.imageimage

Initial Setup

  • I started the machine and the AttackBox provided by TryHackMe.- After launching the AttackBox, I navigated to the target IP address in a web browser.

image

Reconnaissance

On visiting the site, I noticed a section titled “Discography” with multiple buttons.

This hinted that the application was including files dynamically via the page parameter — a strong indicator of a potential LFI vulnerability.image

Exploitation: LFI and Path Traversal

Since the room hinted at file inclusion, I tested the following payload:

http://MACHINE_IP/?page=../../../../etc/passwd

Success! The contents of /etc/passwd were displayed, confirming the presence of a Local File Inclusion vulnerability.image

Searching for the Flag

Now that I had confirmed LFI, the next step was to find and read the flag. I tried exploring directories that might contain flags, such as:image

Then, I tried:image

🎉 Flag found!

The flag was successfully displayed in the browser.

Conclusion

This was a great exercise in exploiting LFI and understanding the importance of secure file inclusion practices. The key steps included:

  • Identifying file inclusion via URL parameters- Performing path traversal- Locating sensitive files such as /etc/passwd and the flag

Thank you for reading my write-up. I hope you found it useful

This post is licensed under CC BY 4.0 by the author.