https://www.vulnhub.com/entry/hackday-albania,167/ Walkthru: A. https://github.com/DavidBrosnan/Walkthroughs/wiki/Hackday-Albania [directory hopping using wfuzz, sql injection, sqlmap, file type restriction upload php reverse shell as jpg, msfvenom, meterpreter, no python 2.7 or gcc, password in config.php, mysql> prompt, outfile from mysql, writetable passwd file, adding a root user/pwd to passwd file ] B. http://security-geek.in/2017/02/08/vulnhub-hack-a-day-albania/ [] C. https://g0blin.co.uk/albania-vulnhub-writeup/ [ dirsearch, sqlmap time based blind attack, why username field is susceptible to attack while password field isnt , port forward in our meterpreter session ] Notes: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Walkthru C.. I note in Sqlmap that we were redirected to index.php when triggering the payload. Let's try entering the generated payload of username= test' RLIKE SLEEP(5)-- s...