Jump to content
Nytro

Advanced MySQL Exploitation

Recommended Posts

Posted

Advanced MySQL Exploitation

by Muhaimin Dzulfakar

Contents
1 Abstract...........................................................................................................................................3
2 Introduction ...................................................................................................................................3
3 Stacked Query................................................................................................................................3
4 Attacking MySQL on applications that do support stacked queries...............................................4
5 Attacking MySQL on applications that do not support stacked queries........................................5
6 Fingerprinting the web server directory.........................................................................................7
6.1 Fingerprint through error message method................................................................................7
6.2 Fingerprint through LOAD_FILE method......................................................................................7
7 Maximum size of arbitrary code allowed........................................................................................7
8 Arbitrary file compression/decompression ....................................................................................8
9 Dealing with columns......................................................................................................................8
10 Remote code execution on LAMP.................................................................................................9
11 Remote code execution on WAMP.............................................................................................10
References .......................................................................................................................................11

Download:

http://dl.packetstormsecurity.net/papers/database/mysql-exploitation.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...