Premise

In this tutorial, I went through Database exploitation through the use of user-defined functions. The vulnerabilities in user-defined functions can be exploited on MariaDB and MYSQL with slight modifications in the path of the plugin directory. Then through system execution function and with our shellcode created we can use our root access to the database to establish and jump from MySQL into system-wide root reverse shell.

Skills Learned

  • Database Exploitation
  • Maria DB
  • MYSQL DB

Get OSCP Certificate Notes

Video Walk-through

About the Author

Mastermind Study Notes is a group of talented authors and writers who are experienced and well-versed across different fields. The group is led by, Motasem Hamdan, who is a Cybersecurity content creator and YouTuber.

View Articles