O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using Weevely for file upload vulnerability

In this recipe, we will use Weevely to exploit file upload vulnerabilities. Weevely is a stealth PHP web shell that simulates a telnet-like connection. It is very handy when you need to create a web shell to exploit file upload vulnerability. It works so well that you don't need to look for any tool or shell. Let's get started.

Getting ready

To step through this recipe, you will need Kali Linux running in Oracle Virtualbox and an Internet connection. No other prerequisites are required.

How to do it...

For this recipe, you need to perform the following steps:

  1. Open the target application file upload page, as shown in the following screenshot:

  2. Open the terminal and type Weevely; it will display the sample ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required