🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/585997.klas4s23.mid-ica.nl/public_html/technowire/images

📁 ..
📄 ada_lovelace.jpg [view]
📄 altair_8800.jpg [view]
📄 apple_i.png [view]
📄 apple_ii.png [view]
📄 apple_macintosh.png [view]
📄 basic_logo.png [view]
📄 bill_gates.jpg [view]
📄 c++_logo.png [view]
📄 c_logo.png [view]
📄 c_sharp_logo.png [view]
📄 chad_hurley_steve_chen_and_jawed_karim.jpg [view]
📄 charles_babbage.jpg [view]
📄 cobol_logo.png [view]
📄 facebook_logo.png [view]
📄 fortran_logo.png [view]
📄 google_logo.png [view]
📄 gordon_moore.jpg [view]
📄 grace_hopper.jpg [view]
📄 hp_garage.jpg [view]
📄 iphone.png [view]
📄 java_logo.png [view]
📄 javascript_logo.png [view]
📄 kevin_mitnick.jpg [view]
📄 larry_page_and_sergey_brin.jpg [view]
📄 linus_torvalds.jpg [view]
📄 mark_zuckerberg.jpg [view]
📄 pascal_logo.png [view]
📄 perl_logo.png [view]
📄 php_logo.png [view]
📄 python_logo.png [view]
📄 rich_skrenta.jpg [view]
📄 ruby_logo.png [view]
📄 ruby_on_rails_logo.png [view]
📄 rust_logo.png [view]
📄 steve_wozniak_and_teve_jobs.jpg [view]
📄 technowire_favicon.png [view]
📄 technowire_logo.png [view]
📄 twitter_logo.png [view]
📄 wifi_logo.png [view]
📄 william_shockley.jpg [view]
📄 windows_3.1.png [view]
📄 windows_95.jpg [view]
📄 youtube_logo.png [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!