🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/581827.klas4s23.mid-ica.nl/public_html/l4-pro-1-food-delivery-express-dumbell

📁 ..
📁 .git
📁 .github
📁 .vscode
📁 Ontwerp
📄 account.php [view]
📁 admin
📄 checkout.php [view]
📁 css
📄 faq.php [view]
📁 fonts
📄 get_cart.php [view]
📁 images
📄 index.php [view]
📁 js
📄 log-in.php [view]
📄 logout.php [view]
📄 menu.php [view]
📁 model
📄 orders.php [view]
📁 php
📄 prg.php [view]
📄 producten.php [view]
📄 save_order.php [view]
📄 sign-up.php [view]
📄 tering-test.php [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!