forked from SpiderLabs/MCIR
-
Notifications
You must be signed in to change notification settings - Fork 0
/
README.phpwn
50 lines (36 loc) · 1.4 KB
/
README.phpwn
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
PHPwn
Ben Loula <[email protected]>
http://www.trustwave.com
INTRODUCTION
============
***WARNING: PHPwn IS INTENTIONALLY VULNERABLE.
DO NOT USE ON A PRODUCTION WEB SERVER. DO NOT
EXPOSE PHPwn IN AN UNTRUSTED ENVIRONMENT.***
PHPwn is a configurable PHP eval() injection testbed. PHPwn allows
you to exploit PHP file inclusion flaws, but furthermore allows
a large amount of control over the manifestation of the flaws.
PHPwn is based on the idea of SQLol, an earlier release which
allows for SQL injection exploitation.
REQUIREMENTS
============
PHP 5.x
Web server
USAGE
=====
Place the PHPwn source files on your Web server and
open in a Web browser.
COPYRIGHT
=========
PHPwn - A configurable PHP eval() injection testbed
Ben Loula <[email protected]>
Copyright (C) 2014 Trustwave Holdings, Inc.
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>