fuzzdb/attack/sql-injection/exploit/README.md

19 lines
711 B
Markdown
Raw Normal View History

2015-09-11 23:39:11 +00:00
various useful post-exploitation commands
2015-09-16 03:02:34 +00:00
**ms-sql-enumeration.fuzz.txt**
* ms-sqli info disclosure payload fuzzfile
* replace regex with your fuzzer for best results <attackerip> <sharename>
* run wireshark or tcpdump, look for incoming smb or icmp packets from victim
* might need to terminate payloads with ;--
2015-09-11 23:39:11 +00:00
2015-09-16 03:02:34 +00:00
**mysql-injection-login-bypass.fuzz.txt**
* regex replace as many as you can with your fuzzer for best results:
* <user-fieldname> <pass-fieldname> <username>
* also try to brute force a list of possible usernames, including possile admin acct names
2015-09-11 23:39:11 +00:00
2015-09-16 03:02:34 +00:00
**mysql-read-local-files.fuzz.txt**
* mysql local file disclosure through sqli
* fuzz interesting absolute filepath/filename into <filepath>