The gMan nixWiki

Because the mind is made of Teflon...

User Tools

Site Tools


method_4_exploitation

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
method_4_exploitation [2022/12/31 22:26] – [Blind SQLi] gmanmethod_4_exploitation [2023/01/12 00:27] (current) – [Defaults] gman
Line 49: Line 49:
 ---- ----
  
 +====== Defaults ======
 +
 +Many folks leave many devices with factory defaults. You can quickly look up the default login creds here: 
 +  * https://www.defaultpassword.com/
 +  * https://default-password.info/
 +  * https://cirt.net/passwords
 +  * [[https://www.google.com/search?q=default+passwords | Or just Google "default passwords"]]. There are a ton of sites.
 +
 +---- 
 ====== Tools ====== ====== Tools ======
  
Line 189: Line 198:
   * It works with a variety of protocols.   * It works with a variety of protocols.
   * It's a bit more difficult to use. The author says it's "less script kiddie friendly."   * It's a bit more difficult to use. The author says it's "less script kiddie friendly."
- 
----- 
- 
-====== Shells ====== 
- 
-===== Reverse Shells ===== 
- 
-{{ :images:shell_reverse_netcat.jpg?nolink |}} 
- 
-In a reverse shell, a victim machine connects back to us at the attack machine. 
-  * You will use reverse shells 95% of the time 
- 
-https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/ 
-http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet 
- 
-**PHP Reverse Shell:**  
-  * Instructions: http://pentestmonkey.net/tools/web-shells/php-reverse-shell 
-  * Download: https://github.com/pentestmonkey/php-reverse-shell 
- 
-===== Bind Shells ===== 
- 
-{{ :images:shell_bind_netcat.jpg?nolink |}} 
- 
-In a bind shell, we connect to the target.  
-  * You fire off an exploint into the target machine, open up a port, and then use the attack machine to connect. 
- 
-https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/  (scroll down) 
  
 ---- ----
Line 223: Line 205:
 ===== Command ===== ===== Command =====
  
-here+**Command Injection Attacks:** These are attacks that attempt to send commands through a web app to the operating system. 
 +  * It would give you the ability to directly manipulate the o/s. 
 +  * On Linux, use the ''system()'' call to send commands to the o/s itself. 
 + 
 +**Example:** If an app asks for a username to set up an account (assuming the username dbag) 
 +  * When we create our account with the username "dbag," the back-end result sent to the o/s would be something like:  
 +    * ''system('mkdir /home/dbag')'' 
 +  * Using command injection, you add commands to our user input: 
 +    * ''dbag & rm -rf /home'' 
 +  * This would result in a command like this:  
 +    * ''system('mkdir /home/dbag & rm -rf /home')'' 
 +  * And that's bad.
  
 ===== SQLi ===== ===== SQLi =====
Line 269: Line 262:
   * They automate these timing-based attacks, making them fairly easy.    * They automate these timing-based attacks, making them fairly easy. 
  
 +----
 +
 +====== Shells ======
 +
 +===== Reverse Shells =====
 +
 +{{ :images:shell_reverse_netcat.jpg?nolink |}}
 +
 +In a reverse shell, a victim machine connects back to us at the attack machine.
 +  * You will use reverse shells 95% of the time
 +
 +https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/
 +http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
 +
 +**PHP Reverse Shell:** 
 +  * Instructions: http://pentestmonkey.net/tools/web-shells/php-reverse-shell
 +  * Download: https://github.com/pentestmonkey/php-reverse-shell
 +
 +===== Bind Shells =====
 +
 +{{ :images:shell_bind_netcat.jpg?nolink |}}
 +
 +In a bind shell, we connect to the target. 
 +  * You fire off an exploint into the target machine, open up a port, and then use the attack machine to connect.
 +
 +https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/  (scroll down)
  
 ---- ----
method_4_exploitation.1672525617.txt.gz · Last modified: by gman