php hacks
reverse shell github repository:
It looks like it's logging everytime someone visits the log.php
if we change the useragent to malicious code, we can execute?
successfully executed
By changing te useragent to the code, it planted a code execution path with the file name (the file name can be anything)
changed useragent to the php code
changed file name to cmd.php in GET
now we can go to http://internal-01.bart.htb/log/cmd.php?cmd=whoami to execute it
now we can do reverse shell!
----
test php
Another case:
Other one liners to try:
Last updated