Statement before class:
1. This sharing is only for learning exchanges, please consciously abide by laws and regulations!
2. Search: Kali and programming, learn more online*** dry goods!
3. Kali and programming are updated on time every day, please learn and pay attention!
Text part
1. Background introduction
Metasploit is a vulnerability framework. Its full name is The Metasploit Framework, or MSF for short. As the most popular tool in the world, Metasploit is not only because of its convenience and power, but also because of its framework. It allows users to develop their own vulnerability scripts for testing. So how to use Metasploit (msf) to blast Mysql weak passwords? How to build Sql target machine? Let us study together next!
2. Resource equipment
1. A virtual machine with WIn7 installed
2. A Xiaobai ready to go.
3. Strategic arrangement
3.1 Use the search engine to retrieve Sql Sever 2008 and download the corresponding installation package, as shown in the figure below.
3.2 Enter the Microsoft official website, select the corresponding language, and click the download button to enter the corresponding download page, as shown in the figure below.
3.3 Select the system version corresponding to the system and download it, as shown in the figure below (a 64-bit system is taken as an example here).
3.4 As shown in the figure below, after selecting the button, the download window will pop up, as shown in the figure below.
3.5 Search for "ssms download" in the search engine and enter the Microsoft official website to download, as shown in the figure below.
3.6 Select "Download SQL Sever Mannagement Studio (SSMS)" to enter the download page, as shown in the figure below.
3.7 Double-click the downloaded SQL installation package and select "New installation or add features to existing installation", as shown in the figure below.
3.8 Choose to accept the agreement and click Next, as shown in the figure below.
3.9 Select "Select All" in the function interface, select the file path, and click Next, as shown in the figure below.
3.10 Configure database naming and select the instance save directory, as shown in the figure below.
3.11 Select "Use the same user for all SQL Sever services", as shown in the figure below.
3.12 Select the second item of the password check box, select OK, and the next step, as shown in the figure below.
3.13 Run the installation process, as shown in the figure below.
3.14 After the installation is complete, close the window, as shown in the figure below.
3.15 Install the database management program (SSMS), as shown in the figure below.
3.16 Configure SQL Sever, as shown in the figure below.
3.17 Start SQL Sever (SQLEXPRESS) service, as shown in the figure below.
3.18 Open the "TCP/IP" service, as shown in the figure below.
3.19 Start the database management program and enter the database configuration page, as shown in the figure below.
3.20 Select the database engine login, as shown in the figure below.
The editor typed each word and created it, but it was hard work. Can you pay attention to it? You can also search: Kali and programming to learn more!
Click me to learn more Kali Linux*** testing and network*** practical skills!