Ms-SQL 1433

1. Nmap for MSSQL Enumeration:

  • Search for related Nmap scripts:

    nmap --script-help "ms and sql"
  • Run Nmap with selected MSSQL scripts:

    nmap --script ms-sql-info,ms-sql-empty-password,ms-sql-xp-cmdshell,ms-sql-config,ms-sql-ntlm-info,ms-sql-tables,ms-sql-hasdbaccess,ms-sql-dac,ms-sql-dump-hashes --script-args mssql.instance-port=1433,mssql.username=sa,mssql.password=,mssql.instance-name=MSSQLSERVER -sV -p 1433 10.11.1.13
  • Run specific MSSQL scripts:

    nmap --script ms-sql-info -p 1433 10.0.0.0
    nmap --script ms-sql-config -p 1433 10.0.0.0
    nmap --script ms-sql-empty-password,ms-sql-xp-cmdshell -p 1433 10.0.0.0
    nmap --script ms-sql-* -p 1433 10.0.0.0

2. Metasploit Modules for MSSQL:

  • Common MSSQL Metasploit modules:

    msfconsole
    msf> use admin/mssql/mssql_enum
    msf> use admin/mssql/mssql_enum_domain_accounts
    msf> use admin/mssql/mssql_enum_sql_logins
    msf> use auxiliary/admin/mssql/mssql_findandsampledata
    msf> use auxiliary/admin/mssql/mssql_idf
    msf> use auxiliary/scanner/mssql/mssql_hashdump
    msf> use auxiliary/scanner/mssql/mssql_schemadump
  • These modules allow you to:

    • Enumerate MSSQL logins and domain accounts.

    • Dump hashes and retrieve database schema.

3. Bruteforcing MSSQL with Hydra:

  • Bruteforce with a username list:

  • Bruteforce with a password list:

4. Connecting to MSSQL with Impacket:

  • SQL Authentication:

  • Windows Authentication:

5. Connecting to MSSQL with sqsh:

  • Basic connection:

  • Connect to a specific database:

6. SQL Commands for Enumeration:

  • Get all users:

  • Switch to a specific database:

  • List available databases:

  • List tables within a database:

  • Get content from a table:

  • Get the MSSQL version:

  • Check permission to execute OS commands:

  • Get linked servers:

  • Create a new user with sysadmin privileges:

  • Get the current username:

Last updated