Home  >  Article  >  Database  >  Record phpmyadmin penetration tips

Record phpmyadmin penetration tips

藏色散人
藏色散人forward
2021-01-07 15:59:382846browse

The following phpmyadmin tutorial column will introduce you to phpmyadmin penetration tips. I hope it will be helpful to friends in need!

Record phpmyadmin penetration tips

##Just record it for yourself, if you all Don’t dislike it when you see it

Some website building software or fool-like building software phpmyadmin often uses ports 888 and 999

<br>

We can try to use nikto to detect the corresponding unauthorized Vulnerability

<br>nikto -host http://Test domain name address: 999/

setup This directory is sometimes not closed by the administrator because the default installation has great hidden dangers. Ha Cha Cha can also Using

we can directly operate without authorization. We can directly create a new server

<br>Record phpmyadmin penetration tips

We can also obtain cached sensitive information when authenticating the page

Record phpmyadmin penetration tips

If you enter phpmyadmin, there are still many vulnerabilities that can be exploited (you can reproduce them yourself)

<br>Record phpmyadmin penetration tips

Tips: Query all directories with directory characteristics at once Let us judge the path more conveniently

show variables like "%dir%";
<br>

The above is the detailed content of Record phpmyadmin penetration tips. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:csdn.net. If there is any infringement, please contact admin@php.cn delete