8080

Now using feroxbuster:

feroxbuster -u http://192.168.221.53:8080/ -C 404,400 -A --wordlist '/usr/share/seclists/Discovery/Web-Content/raft-large-directories.txt' -B --auto-tune

Visiting /site: Checking for LFI vulnerability:

http://192.168.221.53:8080/site/index.php?page=../../../../../../../../../Windows/System32/Drivers/etc/hosts

We also have RFI:

Now we can get a php reverse shell from revshells.com: Put it in a file php-reverse-shell.php Now start a python server:

Visit this:

Now we get a shell:

Got local.txt from rupert's desktop

Now we find a backup directory:

It TFTP.exe runs every 5 minutes so we can replace it with a reverse shell.

Create a reverse shell.

Now we can transfer to the target machine:

Now we get a shell in 5 minutes:

Last updated

Was this helpful?