DB: 2020-05-04

1 changes to exploits/shellcodes
This commit is contained in:
Offensive Security 2020-05-04 05:01:47 +00:00
parent 9de5d20d13
commit ba366e9374

View file

@ -12,8 +12,7 @@
# cf # cf
# #
# Three stages: # Three stages:
# 1. Use the SQL Injection to get the contents of the cache for current # 1. Use the SQL Injection to get the contents of the cache for current endpoint
endpoint
# along with admin credentials and hash # along with admin credentials and hash
# 2. Alter the cache to allow us to write a file and do so # 2. Alter the cache to allow us to write a file and do so
# 3. Restore the cache # 3. Restore the cache
@ -67,8 +66,7 @@ class DatabaseCondition
class SelectQueryExtender { class SelectQueryExtender {
# Contains a DatabaseCondition object instead of a SelectQueryInterface # Contains a DatabaseCondition object instead of a SelectQueryInterface
# so that $query->compile() exists and (string) $query is controlled by # so that $query->compile() exists and (string) $query is controlled by us.
us.
protected $query = null; protected $query = null;
protected $uniqueIdentifier = QID; protected $uniqueIdentifier = QID;