RamadhanAmizudin / fimap

Automatically exported from code.google.com/p/fimap
1 stars 1 forks source link

1 more problem i m facing .. #28

Closed GoogleCodeExporter closed 9 years ago

GoogleCodeExporter commented 9 years ago
i got this option as given below .. 

##################################################
Choose vulnerable script: 1
[INFO] Testing php-code injection thru POST...
[OUT] PHP Injection works! Testing if execution works...
[INFO] Testing execution thru 'popen'...
[INFO] Testing execution thru 'passthru'...
[INFO] Testing execution thru 'exec'...
[INFO] Testing execution thru 'system'...
########################################
#:: Available Attacks - PHP Only ::    #
########################################
#[1] Spawn reverse shell               #
#[q] Quit                              #
########################################
Choose Attack: 1
IP where the reverse shell should connect to:

--------------------------------------------------

now plz tell me which ip should i put there (i used port as 5992 ..its open
4 me as well as target too ) .. mine or my target's ip .. 

& wat command shloul i run in netcat ... 

i tried 2 commands :--

1)nc -l -n -v -p 5992
& 
2)nc -vv -l -n -p 5992

Thank you .. 

Original issue reported on code.google.com by jay.yog...@gmail.com on 24 May 2010 at 8:37

GoogleCodeExporter commented 9 years ago
Hi jay,

This is not a bug or bugreport.
Please send me an email to fimap.dev@gmail.com
I will help you then about this problem.

-imax.

Original comment by fimap....@gmail.com on 25 May 2010 at 11:35