Skip to main content

CTF - SQLi TO SHELL Challenge Walkthrough

Now, SQLi to SHELL is one of the VM machine challenge to get shell of the server using SQLi.

PENETRATION METHODOLOGY:
  • NMAP
  • SQLMAP
  • METASPLOIT
EXPLOITATION

First of all, we need to enumerate the services and ports running on the server for the information gathering purpose of the target.

As the result shows that the target is running ssh and http services.
Now check the HTTP for further information gathering.

On visiting HTTP, it running a photoblog.

On further enumeration, we get that the server is vulnerable to SQLi vulnerability. As we are able to run sqlmap on the server and try to find out the user details.

On running sqlmap, we get the admin user and password.
Trying to login with this credentials and we are successful to enter in the admin panel.

Now try to upload our malicious php script and get a reverse tcp shell. We create the malicious payload using msfvenom with file extension as 'php3' because the server does not allow us to upload file on the server with extension 'php'.

Now on visiting the file we get the meterpreter reverse shell.

Now, we are in the shell of the server.
Now, this is completed.

Challenge completed by - M4TRIX_H4CK3R

Comments

Popular posts from this blog

Bypass Ubuntu Login Screen

Here is the new post on the series of the bypassing of the login screens of the different Operating Systems . In this post, we are going to bypass login screen of the 'Ubuntu 16.04 LTS' . This method is basically works on all Ubuntu . Here is the screen of the Login of the Ubuntu 16.04 LTS which we are going to bypass. STEPS:- Steps 1 :  First restart the system and load the GRUB menu by holding SHIFT  key when the BIOS  loads. After that selects ' Advanced Options ' and you will get this menu. Steps 2 :  Then selects recovery mode on the above menu and you will get the following menu. Steps 3 :  Then selects the root menu and you will dropped into root shell of the system. Steps 4 :  Then run the following commands: mount -rw -o remount / passwd <username> After the successful completion of the command, you have successfully changed the root password of the system. You find the root username of the system by changin...

Bypass Kali Linux Login Screen

This is the another post of the Operating System Login Mechanism bypass series. In this post, we are going to bypass the login screen of the Kali Linux that works on all Kali rollings. This is method is slightly different from the method of the Ubuntu. STEPS:- Step 1 :  First, boot the Kali rolling and you will find the GRUB Menu of the KALI. Step 2 :  Then press 'e'  key to load the GRUB. Step 3 :  After that, replace 'ro'  to 'rw'  and 'init=/bin/bash'  at the same line and press 'F10'  key to load with this GRUB file. Step 4 :  After the boot, you will dropped into the root shell of the system. Step 5 :  Now, type 'passwd root'  command and enter the new unix password twice of the root user. Now, Reboot the system and boot normally and you are able to login to the root account of the Kali-rolling with the new password. Post written by - M4TRIX_H4CK3R Author  -  https://en.gra...