Remote Exploitation Part-0010 MySQL




So we have discussed attacking TCP-based protocols such as FTP, SSH, and SMTP.

Now we on -> UDP, SQL Server is a UDP service.

First tests is perform is targeting the authentication.
MySQL Servers

Most widely used Database's in modern web applications.
Find in 8 out of 10 web applications.
First attack is test the weak credentials that gives us immediate access to the SQL database.


Fingerprinting MySQL Version

Already -> enumeration is the fundamental key to successful exploitation.
        The better way is enumerate the target with better exploit.

So, we have built-in auxiliary module in Metasploit that could help us Fingerprint the exact version of MySQL being used.
Module Called -> mysql_versions.

Let's go ON::
 first we need to target scan to check open port's or services running
Second we need to identify our target port and service like in this here!!

And we do with  NSE (NMAP Script Engine)
Here locations of scripts of nmap.



So let's with Metasploit
We talk this auxiliary's this contains all type of scanners in this module.
So we use mysql/mysql_ what we want to use

Final result of Metasploit::


First : use the use auxiliary/scanners/mysql/mysql_version
Second : show options
 set RHOSTS <target IP>
Third : run
Run used for auxiliary's or other scanning modules and exploit used for exploit the vulnerabilities.

Now we run the command!! but you can see responds but the target system is not allowed. The system  used in firewall or other security mechanism used in target systems.
But now in time Maria DB server less weak but the systems is up-to-date so we don't connect without a proper permission.
First we need to system security down or bypass the security's.

Comments

Popular posts from this blog

Remote Exploitation Part-0011 Metasploit With Windows Host

Metasploit Framework Exploitation Basics

Remote Exploitation Part-0001 Tools