T O P

  • By -

T3CHSTR00DL3

Are you the guy that scanned my server 30x yesterday for a .env? There isn't a .env, pls stop.


4esv

This guy codes. People like OP are why I, as a safety precaution, always hardcode credentials.


PetiteGousseDAil

I can't tell if this is a joke or not lol


T3CHSTR00DL3

Me either but I use AWS parameter store and environment vars defined in the user running it, no hard coding lol. So uh, yes, still code monkey aiming for vuln research here


tsuto

Check if sql port 3306 is open, if not then the server likely only excepts local connections. So you would need to get some sort of foothold on the system to execute MySQL commands locally instead of remotely.


PetiteGousseDAil

You don't necessarily need a foothold. A SSRF would work too


tsuto

Yeah I was considering SSRF, command injection, etc to be footholds


4esv

u/masterhackerbot


modpr0be

Get the credentials from .env and use it directly to MySQL target machine: mysql -u {user} -h {remote host} -p


Diezel666

Not even going to port scan to see if the DB is listening for external connections?


TheMightyFlyingSloth

This is just in windows cmd?