wireshark

1 article
sort: new top best
clear filter
0 8/10

A detailed technical writeup demonstrating how to abuse MySQL's LOAD DATA LOCAL INFILE feature by setting up a fake MySQL server that tricks clients into reading arbitrary files from their local machine. The author provides packet-level analysis, a working Python proof-of-concept exploit, and network traffic documentation showing the authentication bypass and file exfiltration mechanism.

MySQL 5.6.28 MySQL 5.7.24 MySQL 8.0.13 PHP 7.0.32 Ubuntu 14.04 Wireshark
vesiluoma.com · devanshbatham/Awesome-Bugbounty-Writeups · 19 hours ago · details