How to Install and Uninstall htshells Package on Kali Linux
Last updated: November 22,2024
1. Install "htshells" package
In this section, we are going to explain the necessary steps to install htshells on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
htshells
Copied
2. Uninstall "htshells" package
This guide let you learn how to uninstall htshells on Kali Linux:
$
sudo apt remove
htshells
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the htshells package on Kali Linux
Package: htshells
Version: 0.1~git20131205-1kali3
Architecture: all
Maintainer: Kali Developers
Installed-Size: 56
Depends: kali-defaults
Homepage: https://github.com/wireghoul/htshells
Priority: optional
Section: utils
Filename: pool/main/h/htshells/htshells_0.1~git20131205-1kali3_all.deb
Size: 9348
SHA256: bb443c563cc977302c197ba2dbddd0f1aab543499c38a18c8e5a2e8662007d01
SHA1: 240a403fbebe9f1506c1a53c9276bf5a39ea9552
MD5sum: e66be31d2838442f073a49f35f6a0a55
Description: Self contained htaccess shells and attacks
htshells is a series of web based attacks based around the .htaccess files.
Most of the attacks are centered around two attack categories. Remote code/
command execution and information disclosure. These attacks are intended for
use during penetration tests or security assessments. It was created to get
shell in a CMS that restricted uploads based on extension and placed each
uploaded file in it's own directory.
Description-md5:
Version: 0.1~git20131205-1kali3
Architecture: all
Maintainer: Kali Developers
Installed-Size: 56
Depends: kali-defaults
Homepage: https://github.com/wireghoul/htshells
Priority: optional
Section: utils
Filename: pool/main/h/htshells/htshells_0.1~git20131205-1kali3_all.deb
Size: 9348
SHA256: bb443c563cc977302c197ba2dbddd0f1aab543499c38a18c8e5a2e8662007d01
SHA1: 240a403fbebe9f1506c1a53c9276bf5a39ea9552
MD5sum: e66be31d2838442f073a49f35f6a0a55
Description: Self contained htaccess shells and attacks
htshells is a series of web based attacks based around the .htaccess files.
Most of the attacks are centered around two attack categories. Remote code/
command execution and information disclosure. These attacks are intended for
use during penetration tests or security assessments. It was created to get
shell in a CMS that restricted uploads based on extension and placed each
uploaded file in it's own directory.
Description-md5: