First of all, this is not my own work, i’m just spreading the word.
Original article can be found here and full credit goes out to the original author.
1 – Introduction
2 – Finding LFI
3 – Checking if proc/self/environ is accessible
4 – Injecting malicious code
5 – Access our shell
6 – Shoutz