-
Notifications
You must be signed in to change notification settings - Fork 14.1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
0f9ffdb
commit 39ed1f4
Showing
3,004 changed files
with
13,549 additions
and
12,440 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
## Load test modules | ||
loadpath test/modules | ||
|
||
## Session module | ||
use auxiliary/scanner/mysql/mysql_login | ||
|
||
## Set global datastore | ||
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
|
||
## Run command | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 | ||
|
||
|
||
## Replication commands | ||
use auxiliary/admin/mysql/mysql_enum | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
Calling `DidYouMean::SPELL_CHECKERS.merge!(error_name => spell_checker)' has been deprecated. Please call `DidYouMean.correct_error(error_name, spell_checker)' instead. | ||
Calling `DidYouMean::SPELL_CHECKERS.merge!(error_name => spell_checker)' has been deprecated. Please call `DidYouMean.correct_error(error_name, spell_checker)' instead. | ||
Overriding user environment variable 'OPENSSL_CONF' to enable legacy functions. | ||
[4mmsf6[0m [0m> loadpath test/modules | ||
Loaded 41 modules: | ||
14 auxiliary modules | ||
13 exploit modules | ||
14 post modules | ||
[4mmsf6[0m [0m> features set mysql_session_type true | ||
mysql_session_type => true | ||
[!] Run the save command and restart the console for this feature to take effect. | ||
[4mmsf6[0m [0m> use auxiliary/scanner/mysql/mysql_version | ||
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true | ||
[+] 127.0.0.1:3306 - 127.0.0.1:3306 is running MySQL 5.5.42 (protocol 10) | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] Auxiliary module execution completed | ||
sessions -K | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> |
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
## Load test modules | ||
loadpath test/modules | ||
|
||
## Session module | ||
use auxiliary/scanner/mysql/mysql_login | ||
|
||
## Set global datastore | ||
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
|
||
## Run command | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 | ||
|
||
|
||
## Replication commands | ||
use auxiliary/scanner/mysql/mysql_version | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
use auxiliary/scanner/mysql/mysql_login | ||
Stopping all jobs... | ||
[4mmsf6[0m auxiliary([1m[31madmin/mysql/mysql_sql[0m) [0m> irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306 | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 11.3.2 | ||
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved! | ||
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password' | ||
[*] MySQL session 3 opened (127.0.0.1:36593 -> 127.0.0.1:3306) at 2024-04-04 08:37:56 +0000 | ||
use post/test/mysql | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful. | ||
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully. | ||
[*] Auxiliary module execution completed | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run session=3 Verbose=true | ||
[4mmsf6[0m post([1m[31mtest/mysql[0m) [0m> [!] SESSION may not be compatible with this module: | ||
[!] * Unknown session platform. This module works with: Apple_iOS, Hardware, Multi, Mainframe, Firefox, NodeJS, Python, JavaScript, PHP, Unix, Irix, HPUX, AIX, FreeBSD, NetBSD, BSDi, OpenBSD, BSD, OSX, Solaris, Arista, Mikrotik, Brocade, Unifi, Juniper, Cisco, Linux, Ruby, R, Java, Android, Netware, Windows, Unknown. | ||
[*] Running against session 3 | ||
[*] Session type is mysql and platform is | ||
[+] should return a version | ||
[+] should support the help command | ||
[*] Testing complete in 0.02 seconds | ||
[*] Passed: 2; Failed: 0; Skipped: 0 | ||
[*] Post module execution completed | ||
sessions -K | ||
[4mmsf6[0m post([1m[31mtest/mysql[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[*] 127.0.0.1 - MySQL session 3 closed. | ||
[4mmsf6[0m post([1m[31mtest/mysql[0m) [0m> |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:(?-mix:\\d+\\.\\d+\\.\\d+\\.\\d+:\\d+) is running MySQL \\d+.\\d+.*)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
use auxiliary/scanner/mysql/mysql_login | ||
Stopping all jobs... | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306 | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 8.3.0 | ||
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved! | ||
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password' | ||
[*] MySQL session 5 opened (127.0.0.1:38877 -> 127.0.0.1:3306) at 2024-04-04 08:38:09 +0000 | ||
use auxiliary/scanner/mysql/mysql_version | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful. | ||
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully. | ||
[*] Auxiliary module execution completed | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run session=5 Verbose=true | ||
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> [+] 127.0.0.1:3306 is running MySQL 8.3.0 | ||
[*] Scanned 1 of 1 hosts (100% complete) | ||
[*] Auxiliary module execution completed | ||
sessions -K | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[*] 127.0.0.1 - MySQL session 5 closed. | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
use auxiliary/scanner/mysql/mysql_login | ||
Stopping all jobs... | ||
[4mmsf6[0m post([1m[31mtest/mysql[0m) [0m> irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306 | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 8.3.0 | ||
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved! | ||
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password' | ||
[*] MySQL session 3 opened (127.0.0.1:36821 -> 127.0.0.1:3306) at 2024-04-04 08:38:08 +0000 | ||
use auxiliary/scanner/mysql/mysql_hashdump | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful. | ||
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully. | ||
[*] Auxiliary module execution completed | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run session=3 Verbose=true | ||
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_hashdump[0m) [0m> [*] Using existing session 3 | ||
[!] No active DB -- Credential data will not be saved! | ||
[*] 127.0.0.1:3306 MySQL - querying with 'SELECT @@version' | ||
[*] 127.0.0.1:3306 MySQL - querying with 'SELECT user,authentication_string from mysql.user' | ||
[+] Saving HashString as Loot: root:$A$005$khLT^T&Bu?0ZV&~D6c96mH/IfIHPMfKHqkSCRC9L9UcAykRDYuQURkOld3D | ||
[+] Saving HashString as Loot: mysql.infoschema:$A$005$THISISACOMBINATIONOFINVALIDSALTANDPASSWORDTHATMUSTNEVERBRBEUSED | ||
[+] Saving HashString as Loot: mysql.session:$A$005$THISISACOMBINATIONOFINVALIDSALTANDPASSWORDTHATMUSTNEVERBRBEUSED | ||
[+] Saving HashString as Loot: mysql.sys:$A$005$THISISACOMBINATIONOFINVALIDSALTANDPASSWORDTHATMUSTNEVERBRBEUSED | ||
[+] Saving HashString as Loot: root:$A$005$d"6EWgv-d.u_X|zV5nHAKjb7EAT/A9z1zqnGOcli2xejgXw42fEiA5C93 | ||
[*] Scanned 1 of 1 hosts (100% complete) | ||
[*] Auxiliary module execution completed | ||
sessions -K | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_hashdump[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[*] 127.0.0.1 - MySQL session 3 closed. | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_hashdump[0m) [0m> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.