Exploitation

Exploitation on this machine is going to require hydra and steg to gain a reverse shell

Hydra

HTTP /department/login.php

hydra -l admin -P /usr/share/seclists/Passwords/probable-v2-top12000.txt 10.10.10.43 http-post-form "/department/login.php:username=^USER^&password=^PASS^:Invalid" -t 64 
  • username = admin

  • password = 1q2w3e4r5t

HTTPS /db/index.php

  • username = admin

  • password = password123

PHP Exploit

With the following exploit an attacker can create a sqlite database with a php extension and insert php code as text fileds. When done , the attacker can execute it by accessing the database file usin a browser.

Exploiting LFI and PHP

Checking for LFI vulnerability

Executing code via PHP for Shell

In the Create New Database section, create a new database called random.php. Then click on random.php in the Change Database section.

Back in our LFI vulnerable page

Last updated

Was this helpful?