Remote Exploitation Part-0010 MySQL
So we have discussed attacking TCP-based protocols such as FTP, SSH, and
SMTP.
Now we on
-> UDP, SQL Server is a UDP service.
First
tests is perform is targeting the authentication.
Most widely used Database's in modern web applications.
Find in 8 out of 10 web applications.
First attack is test the weak credentials
that gives us immediate access to the SQL database.
Fingerprinting MySQL Version
Already -> enumeration is the fundamental key to successful
exploitation.
So, we have built-in auxiliary module in Metasploit that could help
us Fingerprint the exact version of MySQL being used.
Module Called -> mysql_versions.
Let's go ON::
Here locations of scripts of nmap.
So let's with
Metasploit
We talk this
auxiliary's this contains all type of scanners in this module.
So we use mysql/mysql_ what we want to use
Final result of Metasploit::
First : use the use
auxiliary/scanners/mysql/mysql_version
Second : show options
set RHOSTS <target IP>
Third : run
Run used for
auxiliary's or other scanning modules and exploit used for exploit the
vulnerabilities.
Now we run the
command!! but you can see responds but the target system is not allowed. The
system used in firewall or other
security mechanism used in target systems.
But now in time Maria
DB server less weak but the systems is up-to-date so we don't connect without a
proper permission.
First we need to
system security down or bypass the security's.






Comments
Post a Comment