exploit-db-mirror/platforms/php/webapps/7562.txt
Offensive Security 5e2fc10125 DB: 2016-09-03
2016-09-03 13:13:25 +00:00

27 lines
931 B
Text
Executable file

.......................................................................
****(remote shell upload)****
script: phpAdBoard
***************************************************************************
download from:http://www.w2b.ru/download/phpAdBoard.zip
***************************************************************************
www.site.com/path/index.php
shell: www.site.com/path/photoes/number_shell.php
-----------------------------------------------------------------------------------------
dork:"powered by phpAdBoard"
if folder photoes is forbidden
after get upload file u do right-click and see image properties and u see address file.
------------------------------------------------------------------------------------------
**************************************************
Author: ahmadbady
**************************************************
# milw0rm.com [2008-12-23]