search exploit/multi/http/drupal_drupageddon (7.0 / 7.31)
<https://github.com/lorddemon/drupalgeddon2/blob/master/drupalgeddon2.py> (CVE-2018-7600)

cat /var/www/html/drupal/sites/default/settings.php (Database Credentials) ⇒ serch for username or password

find / -name '*.sql' 2>/dev/null

grep -iE "admin.*@.*" dump.sql

#search (error.log) for socket info
socket: '/run/mysqld/mysqld.sock' ⇒ mysql -u root -S /run/mysqld/mysqld.sock

# had this sqldb somewhere