This article is a part of my file inclusion series. If you do not know about file inclusion vulnerability I suggest you read my introductory article on the topic.
In this article I will talk about how file inclusion can be used to harvest information. I will go into more technical details from this point, so I will assume that you have some really basic understanding of web application development when reading this. If not I suggest you find some basic tutorials on it and read through those first, before coming back to this article series. (more…)