Two ways to upload WebShell through SQLi
From SQL injection to RCE Once a MySQL database server has been compromised at the root level, it’s often possible to escalate this access to full system level access. In...
Web Exploitation / Web Maintaining Access / WebApp PenTest
by do son · Published April 11, 2017 · Last modified September 12, 2017
From SQL injection to RCE Once a MySQL database server has been compromised at the root level, it’s often possible to escalate this access to full system level access. In...
Web Exploitation / Web Maintaining Access / WebApp PenTest
by do son · Published December 27, 2016 · Last modified September 1, 2017
File upload vulnerability is when the user uploads an executable script file, and through the script file to obtain the ability to execute server-side commands. This attack is the most...
Web Maintaining Access / WebApp PenTest
by do son · Published December 19, 2016 · Last modified November 4, 2024
Introduce WeBaCoo – Web Backdoor Cookie Script-Kit. aiming to provide a stealth terminal-like connection over HTTP between client and web server. It is a post exploitation tool to maintain access...
Exploitation / Information Gathering / Maintaining Access / Metasploit / Network PenTest / Post Exploitation / Vulnerability Analysis / Web Exploitation / Web Information Gathering / Web Maintaining Access / Web Vulnerability Analysis / WebApp PenTest
by ddos-admin · Published December 15, 2016 · Last modified November 4, 2024
Penetration Testing Toolkit A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering,DNS Queries,IP Tools,Domain tools and much more. Features Includes web interface for different tools for...