http [Initial-access]

Looking at the hidden directory

In /login directory
I found that there are three files in the login directory. Upon checking the login.php.swp file I found the logic used behind login page coding. They have used the strcmp function with Loose comparison.

Checking the code of login.php.swp

Reading code:


We can see that the strcmp function is used here.
I found a method to bypass it.

Intercepting the request.

In the code analysis, I have seen that there is "root" mentioned in code. I am assume that as username and will try to login with that. Also I will changed parameter value to array by adding square bracket in it.

Now forward the request.
When I forwarded the request, we got the upload file directory.

Uploading php for initial access
Now I will upload php reverse shell for initial access.
Made the shell.php using revshell.com website.

Upload this file.

I know that upload directory is present at "_uploaded" as found using gobuster initially.

I can see my file. I will first start listener and then click on the shell.php to access it.

I got the shell.

stabilizing the shell.

Last updated
Was this helpful?