We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
./exploit.sh www.example.com.br:8080 [+] CVE-2016-10033 exploit by opsxcq [+] Exploiting www.example.com.br:8080 [+] Target exploited, acessing shell at http://www.example.com.br:8080/backdoor.php [+] Running whoami Base64: invalid entry
RemoteShell> pwd [+] Running pwd base64: entrada inválida
What Happens?
uname -ra Linux fbctf 4.6.0-kali1-amd64 #1 SMP Debian 4.6.4-1kali1 (2016-07-21) x86_64 GNU/Linux
The text was updated successfully, but these errors were encountered:
The container is up and running ?
Sorry, something went wrong.
I am testing on a remote server. With the exact version of the fault
Run this exploit against the docker image in this repository only.
No branches or pull requests
./exploit.sh www.example.com.br:8080
[+] CVE-2016-10033 exploit by opsxcq
[+] Exploiting www.example.com.br:8080
[+] Target exploited, acessing shell at http://www.example.com.br:8080/backdoor.php
[+] Running whoami
Base64: invalid entry
RemoteShell> pwd
[+] Running pwd
base64: entrada inválida
What Happens?
uname -ra
Linux fbctf 4.6.0-kali1-amd64 #1 SMP Debian 4.6.4-1kali1 (2016-07-21) x86_64 GNU/Linux
The text was updated successfully, but these errors were encountered: