MySQL & MSSQL Enumeration
SQL (Structured Query Language) is a programming language used to manage and manipulate databases. It enables tasks like inserting, updating, querying, and deleting data. SQL databases use port 1433 (Microsoft SQL Server), 3306 (MySQL), and 5432 (PostgreSQL) for communication, allowing applications to interact with and retrieve information from structured data repositories.
MySQL - Basic Enumeration
Mysql command-line tool
The "mysql" command-line tool is used to access and manage MySQL databases, connecting to a server with specified credentials and options.
Connecting to a MySQL Database Server: This command is used to connect to a MySQL database server hosted at the specified
<target>
IP address or hostname using the specified<user>
username.
Common MySQL Command-Line Commands:
Connect to the Database: The
;
symbol is used to terminate commands, but it is not a standalone command for connecting. To connect to a database, you typically use:
Count the Records in a Table: Counts the number of records in the
authors
table.
Retrieve All Records from a Table: Retrieves all records from the
authors
table.
Attempt to Read a File: Attempts to read the contents of the
/etc/shadow
file, which is a potential security vulnerability if file read access is granted.
MySQL & MSSQL: Nmap Enumeration Scripts
Gather Basic Information: This command is used with Nmap to gather basic information about Microsoft SQL Server instances during network scanning.
Gather NTLM Authentication Information: This command is employed with Nmap to gather NTLM authentication information from Microsoft SQL Server instances running on port 1443.
Perform Brute-Force Attacks: This command is used to perform brute-force attacks on Microsoft SQL Server instances using username and password lists located in the specified directory paths.
Detect Empty (Blank) Passwords: This command is used with Nmap to detect Microsoft SQL Server instances with empty (blank) passwords.
Execute SQL Queries: This command is used with Nmap to execute a specific SQL query on a Microsoft SQL Server instance using provided credentials and save the output to
output.txt
.
Dump Password Hashes: This command is used with Nmap to attempt dumping password hashes from a Microsoft SQL Server instance using provided credentials.
Execute Commands via
xp_cmdshell
: This command is used with Nmap to execute the specified command (ifconfig
in this case) using thexp_cmdshell
extended stored procedure on a Microsoft SQL Server instance.
Detect Empty (Blank) Passwords: This command is used with Nmap to detect MySQL servers with empty (blank) passwords.
Determine if MySQL Servers Provide Empty Password Information: This command is used with Nmap to determine if MySQL servers provide empty (blank) password information.
Identify MySQL Users: This command is used with Nmap to identify MySQL users on the target server, attempting to authenticate using the username
root
and an empty password.
Enumerate MySQL Databases: This command is used with Nmap to enumerate MySQL databases on the target server, trying to authenticate using the username
root
and an empty password.
Retrieve MySQL Server Variables: This command is used with Nmap to retrieve MySQL server variables from the target, attempting to authenticate with the username
root
and an empty password.
Perform a Basic MySQL Security Audit: This command is employed with Nmap to perform a basic MySQL security audit on the target server.
Dump MySQL Password Hashes: This command is used with Nmap to attempt dumping password hashes from a MySQL server using the username
root
and an empty password.
Execute a Specific SQL Query: This command is used with Nmap to execute a specific SQL query on a MySQL server, using the query
"select count(*) from books.authors;"
, and attempting authentication with the usernameroot
and an empty password.
Perform a MySQL Security Audit with a Specified Audit File: This command is used with Nmap to perform a MySQL security audit using a specified audit file.
MySQL & MSSQL: Metasploit Enumeration Scripts
Microsoft SQL Server Commands: In
msfconsole
, the commanduse auxiliary/scanner/mssql/mssql_login
is used to perform login attempts on Microsoft SQL Server instances for credential testing during security assessments.
Enumerate SQL Server Logins: In
msfconsole
, the commanduse auxiliary/admin/mssql/mssql_enum_sql_logins
is used to enumerate SQL Server logins on a Microsoft SQL Server instance during security assessments.
Execute Arbitrary SQL Commands: In
msfconsole
, the commanduse auxiliary/admin/mssql/mssql_exec
is used to execute arbitrary SQL commands on a Microsoft SQL Server instance during security assessments.
Enumerate Domain Accounts: In
msfconsole
, the commanduse auxiliary/admin/mssql/mssql_enum_domain_accounts
is used to enumerate domain accounts on a Microsoft SQL Server instance during security assessments.
Scan for Writable Directories: In
msfconsole
, the commanduse auxiliary/scanner/mysql/mysql_writable_dirs
is used to scan for MySQL databases with writable directories for security assessment.
Retrieve MySQL Password Hashes: In
msfconsole
, the commanduse auxiliary/scanner/mysql/mysql_hashdump
is used to retrieve password hashes from a MySQL database for security assessment.
MySQL: Dictionary Attack
In
msfconsole,
the commanduse auxiliary/scanner/mysql/mysql_login
is used to perform login attempts on MySQL servers for credential testing during security assessments.
This command uses Hydra to perform a brute-force attack on a MySQL server located at the specified target. It attempts to guess the password for the "root" username using the "unix_passwords.txt" wordlist.
Hacker's Mantra:
Garbage can provide important details for hackers: names, telephone numbers, a company’s internal jargon. - Kevin Mitnick
Last updated
Was this helpful?