🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/tmp

📁 ..
📄 sess_2goo9uhcl88gm6ta97hjpioptp [view]
📄 sess_3k9akh5li99i9trm6ucvrcrcqi [view]
📄 sess_5kh1uhidibbnpi15ugtomgb3ii [view]
📄 sess_7motd76n4nf0l6k7bacs6lepaf [view]
📄 sess_bubms97ie8lf2i3s1mrgslts3d [view]
📄 sess_fc6o2dhuqkt22ppfgag2k0f4og [view]
📄 sess_i4c7k3agha1s45op8u0e7bm9d4 [view]
📄 sess_khbsi3t398bf9jkp3cmbjthssu [view]
📄 sess_onqok08sthphcsre3h50kq2gp8 [view]
📄 sess_r9369d9tjp0g99cdghsbirfc2d [view]
📄 sess_te7v59e6jrr2cumpm2a144mnee [view]
📄 sess_u6ujdl8guh32elss4ifeku0dfs [view]
📄 sess_va5ud1n7nsd6m0h0caoomp6v55 [view]

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!