fuzzdb/attack/sql-injection/exploit/README.md
2015-09-15 23:02:34 -04:00

711 B

various useful post-exploitation commands

ms-sql-enumeration.fuzz.txt

  • ms-sqli info disclosure payload fuzzfile
  • replace regex with your fuzzer for best results
  • run wireshark or tcpdump, look for incoming smb or icmp packets from victim
  • might need to terminate payloads with ;--

mysql-injection-login-bypass.fuzz.txt

  • regex replace as many as you can with your fuzzer for best results:
  • also try to brute force a list of possible usernames, including possile admin acct names

mysql-read-local-files.fuzz.txt

  • mysql local file disclosure through sqli
  • fuzz interesting absolute filepath/filename into