Ms-SQL 1433
1. Nmap for MSSQL Enumeration:
nmap --script-help "ms and sql"nmap --script ms-sql-info,ms-sql-empty-password,ms-sql-xp-cmdshell,ms-sql-config,ms-sql-ntlm-info,ms-sql-tables,ms-sql-hasdbaccess,ms-sql-dac,ms-sql-dump-hashes --script-args mssql.instance-port=1433,mssql.username=sa,mssql.password=,mssql.instance-name=MSSQLSERVER -sV -p 1433 10.11.1.13nmap --script ms-sql-info -p 1433 10.0.0.0 nmap --script ms-sql-config -p 1433 10.0.0.0 nmap --script ms-sql-empty-password,ms-sql-xp-cmdshell -p 1433 10.0.0.0 nmap --script ms-sql-* -p 1433 10.0.0.0
2. Metasploit Modules for MSSQL:
msfconsole msf> use admin/mssql/mssql_enum msf> use admin/mssql/mssql_enum_domain_accounts msf> use admin/mssql/mssql_enum_sql_logins msf> use auxiliary/admin/mssql/mssql_findandsampledata msf> use auxiliary/admin/mssql/mssql_idf msf> use auxiliary/scanner/mssql/mssql_hashdump msf> use auxiliary/scanner/mssql/mssql_schemadump
3. Bruteforcing MSSQL with Hydra:
4. Connecting to MSSQL with Impacket:
5. Connecting to MSSQL with sqsh:
6. SQL Commands for Enumeration:
Last updated