Skip to content

Clarifications on Popping a reverse shell via SQL link abuse #149

@GrassfedMeatSticks

Description

@GrassfedMeatSticks

Not sure how far into the weeds you want to get with keeping workspaces, terminals, and operations organized, but without prior experience or your explicit in-person instruction, the Popping a reverse shell via SQL link abuse section would have been difficult to complete. Would this be a good place to gently begin introducing organizing principles for aspiring pen testers?

General recommendations in chronological order:

Pull up Mayfly (creator of GOAD!) blog about attacking SQL here.

  • Would it be difficult to stage scripts either on the Kali VMs OR in a place where we could browse to or curl from?

Copy the contents of the python reverse shell code Mayfly supplies us with... Save that to a file called revshell.py in a new tab.

  • Would it be overkill or redundant to provide guidance as to how and where you'd like revshell.py to be saved? Should we have spun up an additional exegol workspace or tab? I ran my mssqlclient.py commands from my one exegol prompt.

Setup a "listener" on some random high number port in order to "catch" a shell from BRAAVOS...

  • Similar to the previous question/recommendation, would it help specifying this is to be done in a separate terminal tab?

Now go back to your tab where you had mssqlclient.py open, and paste the resulting code into the xp_cmdshell prompt on BRAAVOS, making sure theh command starts with xp_cmdshell:

  • Typo (theh).
  • Consider "Now go back to the terminal tab with the SQL >braavos (sa dbo@master)> prompt. Type xp_cmdshell then a space, then paste the output from the revshell.py script."

Of note, my reverse shell returned some additional/different output from your screenshot. Not sure if it was because it was done outside of an exegol prompt/session.
Image

Metadata

Metadata

Assignees

Labels

GOAD-v1.1Issues to address for LPLITE:GOAD v1.1

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions