-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Not sure how far into the weeds you want to get with keeping workspaces, terminals, and operations organized, but without prior experience or your explicit in-person instruction, the Popping a reverse shell via SQL link abuse section would have been difficult to complete. Would this be a good place to gently begin introducing organizing principles for aspiring pen testers?
General recommendations in chronological order:
Pull up Mayfly (creator of GOAD!) blog about attacking SQL here.
- Would it be difficult to stage scripts either on the Kali VMs OR in a place where we could browse to or curl from?
Copy the contents of the python reverse shell code Mayfly supplies us with... Save that to a file called revshell.py in a new tab.
- Would it be overkill or redundant to provide guidance as to how and where you'd like
revshell.pyto be saved? Should we have spun up an additional exegol workspace or tab? I ran mymssqlclient.pycommands from my one exegol prompt.
Setup a "listener" on some random high number port in order to "catch" a shell from BRAAVOS...
- Similar to the previous question/recommendation, would it help specifying this is to be done in a separate terminal tab?
Now go back to your tab where you had mssqlclient.py open, and paste the resulting code into the xp_cmdshell prompt on BRAAVOS, making sure theh command starts with xp_cmdshell:
- Typo (theh).
- Consider "Now go back to the terminal tab with the SQL >braavos (sa dbo@master)> prompt. Type
xp_cmdshellthen a space, then paste the output from therevshell.pyscript."
Of note, my reverse shell returned some additional/different output from your screenshot. Not sure if it was because it was done outside of an exegol prompt/session.
