Skip to content

Latest commit

 

History

History
26 lines (16 loc) · 561 Bytes

README.md

File metadata and controls

26 lines (16 loc) · 561 Bytes

imagetragick

A simple script to exploit imagetragick vulnerability to gain remote code execution

Ensure you have portforwarded to receive connections

python2.7 is been setted up as system path

Tested on mac and ubuntu

###Usage ./imagik.py

$ python imagik.py
1.)Execute the py script
2.)Now give the (Public Ip) to connect back
3.)netcat will be waiting for reverse shell at port 4444
3.)Upload the .mvg file to the website you are testing 
5.)If site is vulnerable to the attack you will get the reverse shell via terminal
.......