Exploitation
Exploitation on this machine is going to require hydra and steg to gain a reverse shell
Hydra
HTTP /department/login.php
hydra -l admin -P /usr/share/seclists/Passwords/probable-v2-top12000.txt 10.10.10.43 http-post-form "/department/login.php:username=^USER^&password=^PASS^:Invalid" -t 64 
username = admin
password = 1q2w3e4r5t
HTTPS /db/index.php

username = admin
password = password123
PHP Exploit
With the following exploit an attacker can create a sqlite database with a php extension and insert php code as text fileds. When done , the attacker can execute it by accessing the database file usin a browser.
Exploiting LFI and PHP
Checking for LFI vulnerability

Executing code via PHP for Shell
In the Create New Database section, create a new database called random.php. Then click on random.php in the Change Database section.
Back in our LFI vulnerable page



Last updated
Was this helpful?