[After penetration] MSF attack database services

0x01 attack Mysql service

1.1 Target Detection

auxiliary/scanner/mysql/mysql_version

Commonly used in the batch mysql network host discovery:

1.2 blasting Login

auxiliary/scanner/mysql/mysql_login

Commonly used in the network in batch and single master login test:

1.3 udf mention the right

exploit/multi/mysql/mysql_udf_payload

Commonly start in the root and root mysql udf mention the right:


1.4 mof mention the right

exploit/windows/mysql/mysql_mof

1.5 Run

auxiliary/admin/mysql/mysql_sql

Implementation of sql statement. Especially in the target environment can not be executed with no script web interface such as:

0x02 attack Sql server service

2.1 enumeration information

auxiliary/admin/mssql/mssql_enum

Very detailed target Sql server information:

Squint for a while in the afternoon to write ~

Guess you like

Origin www.cnblogs.com/-mo-/p/11970146.html