The gMan nixWiki

Because the mind is made of Teflon...

User Tools

Site Tools


method_4_exploitation

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
method_4_exploitation [2022/12/31 22:26] – [Tool: SQLMap] gmanmethod_4_exploitation [2023/01/12 00:27] (current) – [Defaults] gman
Line 49: Line 49:
 ---- ----
  
 +====== Defaults ======
 +
 +Many folks leave many devices with factory defaults. You can quickly look up the default login creds here: 
 +  * https://www.defaultpassword.com/
 +  * https://default-password.info/
 +  * https://cirt.net/passwords
 +  * [[https://www.google.com/search?q=default+passwords | Or just Google "default passwords"]]. There are a ton of sites.
 +
 +---- 
 ====== Tools ====== ====== Tools ======
  
Line 189: Line 198:
   * It works with a variety of protocols.   * It works with a variety of protocols.
   * It's a bit more difficult to use. The author says it's "less script kiddie friendly."   * It's a bit more difficult to use. The author says it's "less script kiddie friendly."
- 
----- 
- 
-====== Shells ====== 
- 
-===== Reverse Shells ===== 
- 
-{{ :images:shell_reverse_netcat.jpg?nolink |}} 
- 
-In a reverse shell, a victim machine connects back to us at the attack machine. 
-  * You will use reverse shells 95% of the time 
- 
-https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/ 
-http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet 
- 
-**PHP Reverse Shell:**  
-  * Instructions: http://pentestmonkey.net/tools/web-shells/php-reverse-shell 
-  * Download: https://github.com/pentestmonkey/php-reverse-shell 
- 
-===== Bind Shells ===== 
- 
-{{ :images:shell_bind_netcat.jpg?nolink |}} 
- 
-In a bind shell, we connect to the target.  
-  * You fire off an exploint into the target machine, open up a port, and then use the attack machine to connect. 
- 
-https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/  (scroll down) 
  
 ---- ----
Line 223: Line 205:
 ===== Command ===== ===== Command =====
  
-here+**Command Injection Attacks:** These are attacks that attempt to send commands through a web app to the operating system. 
 +  * It would give you the ability to directly manipulate the o/s. 
 +  * On Linux, use the ''system()'' call to send commands to the o/s itself. 
 + 
 +**Example:** If an app asks for a username to set up an account (assuming the username dbag) 
 +  * When we create our account with the username "dbag," the back-end result sent to the o/s would be something like:  
 +    * ''system('mkdir /home/dbag')'' 
 +  * Using command injection, you add commands to our user input: 
 +    * ''dbag & rm -rf /home'' 
 +  * This would result in a command like this:  
 +    * ''system('mkdir /home/dbag & rm -rf /home')'' 
 +  * And that's bad.
  
 ===== SQLi ===== ===== SQLi =====
Line 238: Line 231:
 Automates SQLi enumeration and exploitation. Use it only after you have manually verified there is indeed an SQLi vulnerability on the target. Automates SQLi enumeration and exploitation. Use it only after you have manually verified there is indeed an SQLi vulnerability on the target.
  
-===== Blind SQLi =====+==== Blind SQLi ====
  
 Blind SQL injection takes two forms: boolean-based (T/F) and timing-based. Blind SQL injection takes two forms: boolean-based (T/F) and timing-based.
Line 269: Line 262:
   * They automate these timing-based attacks, making them fairly easy.    * They automate these timing-based attacks, making them fairly easy. 
  
 +----
 +
 +====== Shells ======
 +
 +===== Reverse Shells =====
 +
 +{{ :images:shell_reverse_netcat.jpg?nolink |}}
 +
 +In a reverse shell, a victim machine connects back to us at the attack machine.
 +  * You will use reverse shells 95% of the time
 +
 +https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/
 +http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
 +
 +**PHP Reverse Shell:** 
 +  * Instructions: http://pentestmonkey.net/tools/web-shells/php-reverse-shell
 +  * Download: https://github.com/pentestmonkey/php-reverse-shell
 +
 +===== Bind Shells =====
 +
 +{{ :images:shell_bind_netcat.jpg?nolink |}}
 +
 +In a bind shell, we connect to the target. 
 +  * You fire off an exploint into the target machine, open up a port, and then use the attack machine to connect.
 +
 +https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/  (scroll down)
  
 ---- ----
method_4_exploitation.1672525607.txt.gz · Last modified: by gman