And your archives sucks also. Please use standard ones. On Wed, Dec 1, 2010 at 12:44 PM, Augusto Pereyra <aepere...@gmail.com>wrote:
> Hi i'd like to share with the community this tool developed by me. > This tool is very usefull when you find some site with the > vulnerability called local file include. > This is a list of functionalities of the tool: > > Can find automatically the root of the file system. > Detect default files outside of the web folder > It will try detect passwords inside the files > Support basic authentication > Can use null byte to bypass some controls > Write a report of the scan to a file > > The tool can be downloaded from: > http://code.google.com/p/lfimap/downloads/list > > Please download the last version > > My English sucks, sorry > Thanks to www.artsweb.com.ar > Best regard > Augusto Pereyra > > ------------------------------------------------------------------------ > This list is sponsored by: Information Assurance Certification Review Board > > Prove to peers and potential employers without a doubt that you can > actually do a proper penetration test. IACRB CPT and CEPT certs require a > full practical examination in order to become certified. > > http://www.iacertification.org > ------------------------------------------------------------------------ > > -- www.google.com
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/