what i do?

Am an Information Risk Consultant and Penetration Tester, i specialize mostly in penetrating secure networks/computer systems where i simulate an organized professional attack against your organization, where after that a detailed report with weakness and exploited vectors are summarized. This will help you gain control over your infrastructures security and maximize your protection.

Monday, March 31, 2014

HACKBATTLE 2013 EMAIL ACCESS FROM DATABASE SERVER

When you gain access to the DB server, the email configurations were stored there, mostly the Testers were supposed to get through the phpMyAdmin.


mysql> use emails;
Database changed
mysql> select * from both_emails;
+----------+----------+-----------+---------------------------+-----------------+
| PersonID | LastName | FirstName | email                     | password        |
+----------+----------+-----------+---------------------------+-----------------+
|        1 | wokabi   | joan      | joan.wokabi@gmail.com     | n@stys4l0nw3b   |
|        2 | daniella | wambuas   | daniell.wambuas@gmail.com | qwerty2014Nasty |
+----------+----------+-----------+---------------------------+-----------------+
2 rows in set (0.00 sec)

mysql>




No comments: