🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/584683.klas4s23.mid-ica.nl/public_html/l8-pro-1-quiztime-2023-PunkySpunk15/QuizTime

📁 ..
📁 .vs
📄 ActiveQuizOperatorWindow.xaml [view]
📄 ActiveQuizOperatorWindow.xaml.cs [view]
📄 ActiveQuizWindow.xaml [view]
📄 ActiveQuizWindow.xaml.cs [view]
📄 App.xaml [view]
📄 App.xaml.cs [view]
📄 AssemblyInfo.cs [view]
📁 Assets
📄 EditQuizWindow.xaml [view]
📄 EditQuizWindow.xaml.cs [view]
📄 EndOfQuizWindow.xaml [view]
📄 EndOfQuizWindow.xaml.cs [view]
📁 Font
📄 MainWindow.xaml [view]
📄 MainWindow.xaml.cs [view]
📄 MakeQuizWindow.xaml [view]
📄 MakeQuizWindow.xaml.cs [view]
📁 Models
📁 QuizImages
📄 QuizTime.csproj [view]
📄 QuizTime.sln [view]
📁 bin
📁 obj
📄 offline_quizzes.json [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!