![]() SQLMap – (Can be found in BackTrack 5).Netcat – (Can be found in BackTrack 5).Burp Proxy – (Can be found in BackTrack 5).Tamper Data – (Can be found in BackTrack 5).Firefox – (Can be found in BackTrack 5).UnicornScan – (Can be found in BackTrack 5's repository).Netdiscover – (Can be found in BackTrack 5).A virtual machine (Example: VMware Player or Virtual Box).Created a backdoor shell via a cron job (Superuser).Created a web shell on the target (Limited user).Manually performed SQL injection injection to dump database. ![]() Uploaded a web shell backdoor (Limited user).Exploited the SQL injection and enumerated database.Interacted with the web server & discovered a the web application that is possibly subject to a SQL injection vulnerability.Banner grabbed the services running on the open port(s).Download video: -Level_4_%28SQL_Injection%29.mp4 Method ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
May 2023
Categories |