Home > Database > phpMyAdmin > Record phpmyadmin penetration tips

Record phpmyadmin penetration tips

藏色散人
Release: 2021-01-07 15:59:38
forward
2970 people have browsed it

The following phpmyadmin tutorial column will introduce you to phpmyadmin penetration tips. I hope it will be helpful to friends in need!

Record phpmyadmin penetration tips

##Just record it for yourself, if you all Don’t dislike it when you see it

Some website building software or fool-like building software phpmyadmin often uses ports 888 and 999

<br>

We can try to use nikto to detect the corresponding unauthorized Vulnerability

<br>nikto -host http://Test domain name address: 999/

setup This directory is sometimes not closed by the administrator because the default installation has great hidden dangers. Ha Cha Cha can also Using

we can directly operate without authorization. We can directly create a new server

<br>Record phpmyadmin penetration tips

We can also obtain cached sensitive information when authenticating the page

Record phpmyadmin penetration tips

If you enter phpmyadmin, there are still many vulnerabilities that can be exploited (you can reproduce them yourself)

<br>Record phpmyadmin penetration tips

Tips: Query all directories with directory characteristics at once Let us judge the path more conveniently

show variables like "%dir%";
Copy after login
<br>
Copy after login

The above is the detailed content of Record phpmyadmin penetration tips. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:csdn.net
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template