🐚 WEB SHELL ACTIVATED

πŸ“ File Browser

Current directory: /home/klas4s23/domains/585455.klas4s23.mid-ica.nl/public_html

πŸ“ ..
πŸ“ .vscode
πŸ“ CV
πŸ“„ CV.html [view]
πŸ“ Foto's
πŸ“ Gastenboek
πŸ“ Gastenboek2
πŸ“„ Google-CianΓ‘n van der Pol.docx [view]
πŸ“ Office
πŸ“„ Persoonlijke Nulmeting - Sjabloon.docx [view]
πŸ“„ Profiel.html [view]
πŸ“„ Projecten.html [view]
πŸ“ Technowire
πŸ“ assets
πŸ“ cgi-bin
πŸ“ chathub
πŸ“ domain-seller
πŸ“„ index.html [view]
πŸ“ l2-2023-eindopdracht-pvb-Epolleke
πŸ“ l2-pro-2-een-game-in-javascript-Epolleke
πŸ“ l7-pro-2-e-learning-2023-Epolleke
πŸ“„ photo-1452716726610-30ed68426a6b.jpg [view]
πŸ“„ style.css [view]

🎯 Available Actions

Command Execution:

Quick Commands:

πŸ“‹ List files | πŸ‘€ Show user | πŸ“ Show directory | πŸ”„ Show processes | πŸ” Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | πŸ” View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!