Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
SQLi scanner to detect SQL vulns
🎯 SQL Injection Payload List
mysqldump --all-databases --single-transaction --quick --lock-tables=false > full-backup-$(date +%F).sql -u root -p
mysql -u root -p < full-backup.sql
mysql> SELECT User FROM mysql.user;
Ces foutus commandes ne veulent pas se mémoriser :)
CREATE DATABASE database;
CREATE USER <A href="/cdn-cgi/l/email-protection" class="cf_email" data-cfemail="fa8f899f88ba9695999b969295898e">[email protected]</A> IDENTIFIED BY 'password';
GRANT ALL PRIVILEGES ON database.* TO <A href="/cdn-cgi/l/email-protection" class="cf_email" data-cfemail="f98c8a9c8bb995969a989591968a8d">[email protected]</A>;
FLUSH PRIVILEGES;
Modifier mot de passe d'un user sur wordpress :
UPDATE wp_users
SET user_pass
= MD5( 'new_password' ) WHERE wp_users
.user_login
= "admin_username";
Modifier mot de passe d'un user sql
ALTER USER 'userName'@'localhost' IDENTIFIED BY 'New-Password-Here';