Upload Shell To Wordpress
Join GitHub today
Website directory) through system, and our shell will be created.If don’t work,try exec because system can be disabled on the webserver from php.ini. 5 – Access our shell – Now lets check if our malicous code was successfully injected.Lets check if the shell is present.
GitHub is home to over 36 million developers working together to host and review code, manage projects, and build software together.
Sign upUpload Wordpress Theme
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
commented Oct 20, 2018 • edited by wvu-r7
edited by wvu-r7
I am running the Mr.Robot CTF and when I try to use the wp_admin_shell_upload.rb PS. the ctf is running on a VMware Steps to reproduceuse metasploit-framework/modules/exploits/unix/webapp/wp_admin_shell_upload.rb Expected behaviorWhat should happen? Current behaviorWhat happens instead? System stuffMetasploit versionmsf exploit(unix/webapp/wp_admin_shell_upload) > version I installed Metasploit with:
OSWhat OS are you running Metasploit on? KALI BABY WOOOOO Linux kali 4.18.0-kali1-amd64 #1 SMP Debian 4.18.6-1kali1 (2018-09-10) x86_64 GNU/Linux |
commented Oct 20, 2018

You can disable the WordPress check with: |
commented Oct 20, 2018 • edited
edited
Your And please don't post spoilers. |