Sqli

  • Published on
    RaspberryPi device that ran PiHole, which had default credentials. Once foothold was obtained, root was a simple sudo -l.
  • Published on
    Eventually landed upon finding SQLi on /room.php?cod=, so we dump databases with sqlmap. Foothold is a simple phpMyAdmin credential login, then a phpMyAdmin 4.8.0 exploit to gain a shell. Root was obtained from exploiting root.service.
  • Published on
    Boolean-based SQL injection, which gives access to a database, then we authenticated file fuzz leading to bypassing .htaccess in apache which gives RCE. Once foothold from RCE was obtained, we pivot as mark, find a local hosted web server, and exploit npm to root.
  • Published on
    Windows machine first exploited with SQLi, getting admin to a website. Then there is a hidden file, which gives me execution to foothold. Eventually I extracted Firefox passwords, used Bloodhound to find out more about what we were looking at, and got a LAPS password to gain root.
  • Published on
    Discovered SQLi to then enumerate the database, authenticate as admin, realize it is vulnerable to some sort of max character length exploit, pivoting from www-data to moshe, then yossi, and finally root.