Basic methodology to approach LFI vulnerability when Pentesting a Web Application
Why should we care !! How to leverage this flaw in social engineering attacks?