method_4_exploitation
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
method_4_exploitation [2022/12/31 22:27] – gman | method_4_exploitation [2023/01/12 00:27] (current) – [Defaults] gman | ||
---|---|---|---|
Line 49: | Line 49: | ||
---- | ---- | ||
+ | ====== Defaults ====== | ||
+ | |||
+ | Many folks leave many devices with factory defaults. You can quickly look up the default login creds here: | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * [[https:// | ||
+ | |||
+ | ---- | ||
====== Tools ====== | ====== Tools ====== | ||
Line 196: | Line 205: | ||
===== Command ===== | ===== Command ===== | ||
- | here | + | **Command Injection Attacks:** These are attacks that attempt to send commands through a web app to the operating system. |
+ | * It would give you the ability to directly manipulate the o/s. | ||
+ | * On Linux, use the '' | ||
+ | |||
+ | **Example: | ||
+ | * When we create our account with the username " | ||
+ | * '' | ||
+ | * Using command injection, you add commands to our user input: | ||
+ | * '' | ||
+ | * This would result in a command like this: | ||
+ | * '' | ||
+ | * And that's bad. | ||
===== SQLi ===== | ===== SQLi ===== |
method_4_exploitation.1672525665.txt.gz · Last modified: by gman