MSSQL (1433)
Footprinting using nmap
sudo nmap --script ms-sql-info,ms-sql-empty-password,ms-sql-xp-cmdshell,ms-sql-config,ms-sql-ntlm-info,ms-sql-tables,ms-sql-hasdbaccess,ms-sql-dac,ms-sql-dump-hashes --script-args mssql.instance-port=1433,mssql.username=sa,mssql.password=,mssql.instance-name=MSSQLSERVER -sV -p 1433 10.129.201.248MSSQL ping in metasploit
use scanner/mssql/mssql_pingConnecting with MSSQL client
python3 mssqlclient.py Administrator@10.129.201.248 -windows-authShow databases command
select name from sys.databasesMSSQL tools:
Protocol Specific Attacks
Code Execution
Write Local Files
Read Local Files
Capture MSSQL Service Hash
Impersonating Existing Users
Communicate with other databases
Last updated