Enumeration, Data Exfiltration, and SSRF Attacks
Basic methodology to approach LFI vulnerability when Pentesting a Web Application
Remote Code Execution through Insecure Deserialization Vulnerability