In this tutorial, I went through Database exploitation through the use of user-defined functions. The vulnerabilities in user-defined functions can be exploited on MariaDB and MYSQL with slight modifications in the path of the plugin directory. Then through system execution function and with our shellcode created we can use our root access to the database to establish and jump from MySQL into system-wide root reverse shell.

Skills Learned

  • Database Exploitation
  • Maria DB

Get OSCP Certificate Notes

Video Walk-through

About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles