http [Initial-access]

Landing page

Looking at the hidden directory

In /login directory

I found that there are three files in the login directory. Upon checking the login.php.swp file I found the logic used behind login page coding. They have used the strcmp function with Loose comparison.

Checking the code of login.php.swp

Reading code:

We can see that the strcmp function is used here.

I found a method to bypass it.

Intercepting the request.

Original Request

In the code analysis, I have seen that there is "root" mentioned in code. I am assume that as username and will try to login with that. Also I will changed parameter value to array by adding square bracket in it.

Changed Username to root and value changed to array.

Now forward the request.

When I forwarded the request, we got the upload file directory.

Uploading php for initial access

Now I will upload php reverse shell for initial access.

Made the shell.php using revshell.com website.

Upload this file.

I know that upload directory is present at "_uploaded" as found using gobuster initially.

I can see my file. I will first start listener and then click on the shell.php to access it.

I got the shell.

stabilizing the shell.

Got the stable shell.

Last updated

Was this helpful?