http://r2km7u25qebaefa7b6jdcjldymc2u337vzpx7ne773ypgs3qlq4xycqd.onion/index.php?search=LFI
.`
This revealed that the script had a parameter named "file" that was vulnerable to path traversal/ LFI :
```
file [Status: 200, Size: 2832, Words: 38, Lines: 49, Duration: 1ms]
```... HackSudo 2 Mar 28, 2025 ..." with a link to the hacksudo website. Suspecting this might be vulnerable to Local File Inclusion ( LFI ), I tested it by appending a file parameter:
```
http://[TARGET_IP]/file.php?