![]() When I try to upload a php shell I get an error: “This is not a valid torrent file”.īecause it can take some time to run SQLmap I’m gonna run it while doing some more recon. To enter the upload page you need to login….so a quick register is all it takes. Torrent Hoster - Remount Upload | exploits/php/webapps/11746.txtĪfter checking the text file it looks like there is a upload vulnerability to exploit. rename/ gives as output: Renamer API Syntax: index.php?filename=old_file_path_an_name&newfilename=new_file_path_and_nameīecause this is a web application I check searchsploit if there is a known exploit. Wordlist : /root/opt/SecLists/Discovery/Web-Content/raft-large-directories.txt gobuster -u -w /root/opt/SecLists/Discovery/Web-Content/raft-large-directories.txt -f -r The scan shows port 22 (SSH) and 80 (HTTP) are open. Nmap done: 1 IP address (1 host up) scanned in 34.46 seconds ![]() ![]() Service Info: OS: Linux CPE: cpe:/o:linux:linux_kernel No exact OS matches for host (If you know what OS is running on it, see ). |_http-title: Site doesn't have a title (text/html). |_http-server-header: Apache/2.2.12 (Ubuntu) nmap -n -A -T4 -sC -oN scan -p- 10.10.10.6Ģ2/tcp open ssh OpenSSH 5.1p1 Debian 6ubuntu2 (Ubuntu Linux protocol 2.0)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |