{"id":350,"date":"2006-09-25T04:48:24","date_gmt":"2006-09-25T04:48:24","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/09\/fis-file-inclusion-scanner-v01-php-vulnerability\/"},"modified":"2010-06-18T09:10:33","modified_gmt":"2010-06-18T08:10:33","slug":"fis-file-inclusion-scanner-v01-php-vulnerability","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/09\/fis-file-inclusion-scanner-v01-php-vulnerability\/","title":{"rendered":"FIS [File Inclusion Scanner] v0.1 – PHP Vulnerability"},"content":{"rendered":"

<\/p>\n

A useful tool for anyone working with PHP applications.<\/p>\n

DESCRIPTION<\/strong>
\n————
\nFIS (File Inclusion Scanner) is a vulnerability scanner for PHP applications. Is scans PHP files mapping PHP\/HTTP variables and then performs a security audit,in order to find out which of them are exploitable.<\/p>\n

USAGE<\/strong>
\n——
\nphp fis.php [local file] [remote file] [remote FIS ID file]<\/p>\n

[local file]<\/strong>
\n————–
\nThe local copy of the PHP source file used by FIS to map the variables for the audit.<\/p>\n

[remote file]<\/strong>
\n————–
\nThe remote copy of the source executed by a remote webserver, the file we will audit.<\/p>\n

[remote FIS ID file]<\/strong>
\n———————-
\nThe FIS ID file is used to check whether a variable is exploitable or not. It contains PHP code that simply echoes a unique MD5 hash used for identification.<\/p>\n

INTENDED AUDIENCE<\/strong>
\n——————
\nFIS is intended to be used by penetration testers, not script kidies nor malicious users. It creates a lot of noise on the remote host and can be easily discovered with a simple glance at
\nthe webserver logs, which makes it useless as a cracking tool.<\/p>\n

FEATURES<\/strong>
\n———
\nFIS, currently, supports audits using only GET requests. COOKIE & POST support is not yet implemented.<\/p>\n

LOGGING<\/strong>
\n———
\nFIS automatically logs extra audit information in “fis.log” in the working directory.<\/p>\n

FIS Website<\/a><\/p>\n

<\/p>\n

You can download FIS directly here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

A useful tool for anyone working with PHP applications. DESCRIPTION ———— FIS (File Inclusion Scanner) is a vulnerability scanner for PHP applications. Is scans PHP files mapping PHP\/HTTP variables and then performs a security audit,in order to find out which of them are exploitable. USAGE —— php fis.php [local file] [remote file] [remote FIS ID […]<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[12,11,15],"tags":[267,396],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Darknet","author_link":"https:\/\/www.darknet.org.uk\/author\/darknet\/"},"_links":{"self":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/350"}],"collection":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/comments?post=350"}],"version-history":[{"count":0,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/350\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/media?parent=350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/categories?post=350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/tags?post=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}