sql misconfiguration and privesc with path vulnerbility
sql misconfiguration and privesc with path vulnerability
. -sV = Probe open ports to determine service/version info.
2 search ip in browser to show admin page.
. qdPM 9.2 = show website version.
3 check version is exploitable or not.
. version is exploitable.
. check last line in exploit this link to install yml file link = http://<website>/core/config/databases.yml
4 Download yml file to see username name and password for mysql databse.
5 chek yml file.
6 enter mysql dabatse use username and password.
# mysql -h 10.10.134.21 -u qdpmadmin -p
. -h = host
. -u = username.
. -p = password
7 show mysql databses.
. to show all dabatbase in mysql.
8 go staff database and show tables.
. this colum to informatin about staff informatin
9 show user table data to information about usernames.
. * = selcet all data.
. To show all users.
. and copy all user and make list for users.
EX:- nano user.txt
. nano = this is a file editor in linux to make and modify files.
10 show password in this user.
. to show all password but password in based64 encrypted.
11 how to decrypt password
. cyberchef = this is a website to decrypt the password.
. and decrypt all password after that make list of decrypt password.
# nano lo.txt
. to paste all password.
12 burte force usernmae and login password with help of hydra tool.
# hydra -L [user name list] -P [password list] 10.10.134.21 ssh
. -L = enter user list.
. -P = enter passwords list.
ssh = service name
. I found 2 username and password.
13 login ssh with travis username.
14 login second user.
. su = this is a linux command to switch user.
NOTE:- please secure your domain before another black hat hacker to find this vulnerability and access your system use for illegal purpose and damage your system for more information to contect me anytime.
NMAE = Rachit
CONTECT NO. = 8810xxxxxx
THANKS.
Comments
Post a Comment