This Blog Are Share Computer Related Tutorials For Education Purpose. ( CCNA | MCSA | Red Hat | Ethical Hacking | A+ | N+ | Computer Programming | Animation | Game Development | Web Designing | Cloud Computing | Android | Tally.ERP 9 | Windows Tips And Tricks | Online Courses | Commerce | Digital Marketing | Vocational Education..)


Saturday, January 27, 2018

Generating A PHP Backdoor with Weevely - Post Exploitation By HackerSploit

Generating A PHP Backdoor with Weevely - Post Exploitation By HackerSploit.

In This Video We Learning How to Generate A PHP Backdoor With Weevely for Post Exploitation.

Weevely Is A Stealth PHP Web Shell That Simulate Telnet-Like Connection. It Is An Essential Tool For Web Application Post Exploitation, And Can Be Used As Stealth Backdoor Or As A Web Shell To Manage Legit Web Accounts, Even Free Hosted Ones.

Kali Linux Is A Debian-Based Linux Distribution Aimed At Advanced Penetration Testing And Security Auditing. Kali Contains Several Hundred Tools Which Are Geared Towards Various Information Security Tasks, Such As Penetration Testing, Security Research, Computer Forensics And Reverse Engineering.

Weevely Command Examples :
  • weevely generate s3cr3t (Backdoor file 'weevely.php' created with password 's3cr3t')
  • weevely s3cr3t


No comments:

Post a Comment