kurobeats / fimap

fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion bugs in webapps.
GNU General Public License v2.0
521 stars 99 forks source link

1 more problem i m facing .. #28

Closed GoogleCodeExporter closed 9 years ago

GoogleCodeExporter commented 9 years ago
i got this option as given below .. 

##################################################
Choose vulnerable script: 1
[INFO] Testing php-code injection thru POST...
[OUT] PHP Injection works! Testing if execution works...
[INFO] Testing execution thru 'popen'...
[INFO] Testing execution thru 'passthru'...
[INFO] Testing execution thru 'exec'...
[INFO] Testing execution thru 'system'...
########################################
#:: Available Attacks - PHP Only ::    #
########################################
#[1] Spawn reverse shell               #
#[q] Quit                              #
########################################
Choose Attack: 1
IP where the reverse shell should connect to:

--------------------------------------------------

now plz tell me which ip should i put there (i used port as 5992 ..its open
4 me as well as target too ) .. mine or my target's ip .. 

& wat command shloul i run in netcat ... 

i tried 2 commands :--

1)nc -l -n -v -p 5992
& 
2)nc -vv -l -n -p 5992

Thank you .. 

Original issue reported on code.google.com by jay.yog...@gmail.com on 24 May 2010 at 8:37

GoogleCodeExporter commented 9 years ago
Hi jay,

This is not a bug or bugreport.
Please send me an email to fimap.dev@gmail.com
I will help you then about this problem.

-imax.

Original comment by fimap....@gmail.com on 25 May 2010 at 11:35