mirror of
https://github.com/fuzzdb-project/fuzzdb.git
synced 2024-11-26 21:10:18 +00:00
.. | ||
db2-enumeration.txt | ||
ms-sql-enumeration.fuzz.txt | ||
mysql-injection-login-bypass.fuzz.txt | ||
mysql-read-local-files.fuzz.txt | ||
postgres-enumeration.txt | ||
README.md |
various useful post-exploitation commands
ms-sql-enumeration.fuzz.txt
ms-sqli info disclosure payload fuzzfile
replace regex with your fuzzer for best results
run wireshark or tcpdump, look for incoming smb or icmp packets from victim
might need to terminate payloads with ;--
mysql-injection-login-bypass.fuzz.txt
regex replace as many as you can with your fuzzer for best results:
also try to brute force a list of possible usernames, including possile admin acct names
mysql-read-local-files.fuzz.txt