Skip to content

Commit a298e24

Browse files
author
Jake Reynolds
committed
updating page descriptions
1 parent 677ddd5 commit a298e24

File tree

49 files changed

+60
-60
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+60
-60
lines changed

attackQueries/dataExfiltration/mysql.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<h3 id="data-exfiltration">Data Exfiltration</h3>
22

33

4-
<p class="injectionDescription">{{site.data.injectionDescriptions.dataExfiltration}}</p>
4+
<p class="pageDescription">{{site.data.injectionDescriptions.dataExfiltration}}</p>
55

66
<p>* Requires privileged user</p>
77
<table class="table table-striped table-hover">

attackQueries/dataExfiltration/oracle.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<h3 id="data-exfiltration">Data Exfiltration</h3>
22

33

4-
<p class="injectionDescription">{{site.data.injectionDescriptions.dataExfiltration}}</p>
4+
<p class="pageDescription">{{site.data.injectionDescriptions.dataExfiltration}}</p>
55

66
<p>* Requires privileged user</p>
77
<table class="table table-striped table-hover">

attackQueries/dataExfiltration/sqlserver.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
<h3 id="data-exfiltration">Data Exfiltration</h3>
22

3-
<p class="injectionDescription">{{site.data.injectionDescriptions.dataExfiltration}}</p>
3+
<p class="pageDescription">{{site.data.injectionDescriptions.dataExfiltration}}</p>
44

55
<p><i>Note: It is possible to make a DNS request from MSSQL. However, this request requires administrator privileges and SQL Server 2005.</i></p>
66
<table class="table table-striped table-hover">

attackQueries/dataTargeting/mysql.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
<h3 id="data-targeting">Data Targeting</h3>
22

3-
<p class="injectionDescription">{{site.data.injectionDescriptions.dataTargeting}}</p>
3+
<p class="pageDescription">{{site.data.injectionDescriptions.dataTargeting}}</p>
44

55
<h3 id="data-targeting-queries">Data Targeting queries</h3>
66

attackQueries/dataTargeting/oracle.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
<h3 id="data-targeting">Data Targeting</h3>
22

3-
<p class="injectionDescription">{{site.data.injectionDescriptions.dataTargeting}}</p>
3+
<p class="pageDescription">{{site.data.injectionDescriptions.dataTargeting}}</p>
44

55
<h3 id="data-targeting-queries">Data Targeting queries</h3>
66

attackQueries/dataTargeting/sqlserver.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
<h3 id="data-targeting">Data Targeting</h3>
22

3-
<p class="injectionDescription">{{site.data.injectionDescriptions.dataTargeting}}</p>
3+
<p class="pageDescription">{{site.data.injectionDescriptions.dataTargeting}}</p>
44

55
<h3 id="data-targeting-queries">Data Targeting queries</h3>
66

attackQueries/executingOSCommands/mysql.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
<h3 id="executing-os-commands">Executing OS Commands</h3>
22

3-
<p class="injectionDescription">{{site.data.injectionDescriptions.executingOSCommands}}</p>
3+
<p class="pageDescription">{{site.data.injectionDescriptions.executingOSCommands}}</p>
44

55
<table class="table table-striped table-hover">
66
<thead>

attackQueries/executingOSCommands/oracle.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
<h3 id="executing-os-commands">Executing OS Commands</h3>
22

3-
<p class="injectionDescription">{{site.data.injectionDescriptions.executingOSCommands}}</p>
3+
<p class="pageDescription">{{site.data.injectionDescriptions.executingOSCommands}}</p>
44

55
<p><a target="_blank" rel="noopener" href="http://www.0xdeadbeef.info/exploits/raptor_oraexec.sql">Java</a> can be used to execute commands if it's installed.</p>
66
<table class="table table-striped table-hover">

attackQueries/executingOSCommands/sqlserver.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
<h3 id="executing-os-commands-through-sql-server">Executing OS Commands Through SQL Server</h3>
22

3-
<p class="injectionDescription">{{site.data.injectionDescriptions.executingOSCommands}}</p>
3+
<p class="pageDescription">{{site.data.injectionDescriptions.executingOSCommands}}</p>
44

55
<table class="table table-striped table-hover">
66
<thead>

attackQueries/index.html

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,22 +8,22 @@ <h3 id="sql-injection-detection">Attack Queries</h3>
88
<p class="readableText">Once the injectable parameters and DBMS type are identified we need to attack the database. Below you will find various section to aid you in escalating privileges, exfiltrating data, and more.</p>
99

1010
<h4 class="subheading"><a class="link" href="{{site.pagebase}}/attackQueries/informationGathering/">Information Gathering</a></h4>
11-
<p class="injectionDescription">{{site.data.injectionDescriptions.informationGathering}}</p>
11+
<p class="pageDescription">{{site.data.injectionDescriptions.informationGathering}}</p>
1212

1313
<h4 class="subheading"><a class="link" href="{{site.pagebase}}/attackQueries/dataTargeting/">Data Targeting</a></h4>
14-
<p class="injectionDescription">{{site.data.injectionDescriptions.dataTargeting}}</p>
14+
<p class="pageDescription">{{site.data.injectionDescriptions.dataTargeting}}</p>
1515

1616
<h4 class="subheading"><a class="link" href="{{site.pagebase}}/attackQueries/privilegeEscalation/">Privilege Escalation</a></h4>
17-
<p class="injectionDescription">{{site.data.injectionDescriptions.privilegeEscalation}}</p>
17+
<p class="pageDescription">{{site.data.injectionDescriptions.privilegeEscalation}}</p>
1818

1919
<h4 class="subheading"><a class="link" href="{{site.pagebase}}/attackQueries/executingOSCommands/">Executing OS Commands</a></h4>
20-
<p class="injectionDescription">{{site.data.injectionDescriptions.executingOSCommands}}</p>
20+
<p class="pageDescription">{{site.data.injectionDescriptions.executingOSCommands}}</p>
2121

2222
<h4 class="subheading"><a class="link" href="{{site.pagebase}}/attackQueries/readingAndWritingFiles/">Reading and Writing Files</a></h4>
23-
<p class="injectionDescription">{{site.data.injectionDescriptions.readingAndWritingFiles}}</p>
23+
<p class="pageDescription">{{site.data.injectionDescriptions.readingAndWritingFiles}}</p>
2424

2525
<h4 class="subheading"><a class="link" href="{{site.pagebase}}/attackQueries/lateralMovement/">Lateral Movement</a></h4>
26-
<p class="injectionDescription">{{site.data.injectionDescriptions.lateralMovement}}</p>
26+
<p class="pageDescription">{{site.data.injectionDescriptions.lateralMovement}}</p>
2727

2828
<h4 class="subheading"><a class="link" href="{{site.pagebase}}/attackQueries/dataExfiltration/">Data Exfiltration</a></h4>
29-
<p class="injectionDescription">{{site.data.injectionDescriptions.dataExfiltration}}</p>
29+
<p class="pageDescription">{{site.data.injectionDescriptions.dataExfiltration}}</p>

0 commit comments

Comments
 (0)