8080
Now using feroxbuster:
feroxbuster -u http://192.168.221.53:8080/ -C 404,400 -A --wordlist '/usr/share/seclists/Discovery/Web-Content/raft-large-directories.txt' -B --auto-tune
Visiting /site:
Checking for LFI vulnerability:
http://192.168.221.53:8080/site/index.php?page=../../../../../../../../../Windows/System32/Drivers/etc/hosts
We also have RFI:
Now we can get a php reverse shell from revshells.com:
Put it in a file php-reverse-shell.php Now start a python server:
Visit this:
Now we get a shell: 
Got local.txt from rupert's desktop
Now we find a backup directory: 

It TFTP.exe runs every 5 minutes so we can replace it with a reverse shell.
Create a reverse shell.
Now we can transfer to the target machine:
Now we get a shell in 5 minutes:
Last updated
Was this helpful?