Conditions:
————–
777 Directory

What Is This:
————–
You Uploaded Shell With With “NoBody” Permission
Let’s Say You Browse To Another Folder Which Is 777 But All Files Are 755 And Belongs To Some User There
To Change Those Files We Do Like This

How To Do It:
—————
Upload Your Own File/Index To That Folder Let’s Say Your Page Called

Evil.php

And The File You Want To Change Is

Index.html

So Execute This:

MV Evil.php Index.html

Explore More

Finding 0days in Web Applications

Most zero-day exploits in web applications are usually easier to find, study, and attack than actual services like a webserver due to the fact that a hacker does not need

Critical SQL Injection in GK Power System (Myanmar)

PlanetCreator reported another Critical SQL injection (vulnerability) on GK Power System (Myanmar) URL : http://www.gkmyanmar.com/ SQL injection is a code injection technique that exploits a security vulnerability occurring in the

What are cryptographic attacks?

Cryptographic attacks are methods of evading the security of a cryptographic system by finding weaknesses in such areas as the code, cipher, cryptographic protocol or key management scheme in the