And your archives sucks also. Please use standard ones.

On Wed, Dec 1, 2010 at 12:44 PM, Augusto Pereyra <aepere...@gmail.com>wrote:

> Hi i'd like to share with the community this tool developed by me.
> This tool is very usefull when you find some site with the
> vulnerability called local file include.
> This is a list of functionalities of the tool:
>
> Can find automatically the root of the file system.
> Detect default files outside of the web folder
> It will try detect passwords inside the files
> Support basic authentication
> Can use null byte to bypass some controls
> Write a report of the scan to a file
>
> The tool can be downloaded from:
> http://code.google.com/p/lfimap/downloads/list
>
> Please download the last version
>
> My English sucks, sorry
> Thanks to www.artsweb.com.ar
> Best regard
> Augusto Pereyra
>
> ------------------------------------------------------------------------
> This list is sponsored by: Information Assurance Certification Review Board
>
> Prove to peers and potential employers without a doubt that you can
> actually do a proper penetration test. IACRB CPT and CEPT certs require a
> full practical examination in order to become certified.
>
> http://www.iacertification.org
> ------------------------------------------------------------------------
>
>


-- 
www.google.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to