-
Notifications
You must be signed in to change notification settings - Fork 14.1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
7725e5d
commit 45bd1cf
Showing
3,006 changed files
with
8,175 additions
and
6,354 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"required_lines": [ | ||
{ | ||
"values": [ | ||
"Instance Name:" | ||
"(?-mix:\\| \\d+.\\d+.*)" | ||
], | ||
"options": { | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:Saving HashString as Loot)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
## Load test modules | ||
loadpath test/modules | ||
|
||
## Session module | ||
use auxiliary/scanner/mysql/mysql_login | ||
|
||
## Set global datastore | ||
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
|
||
## Run command | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 | ||
|
||
|
||
## Replication commands | ||
use auxiliary/admin/mysql/mysql_enum | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:Saving HashString as Loot)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:(?-mix:\\d+\\.\\d+\\.\\d+\\.\\d+:\\d+) is running MySQL \\d+.\\d+.*)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:(?-mix:\\d+\\.\\d+\\.\\d+\\.\\d+:\\d+) is running MySQL \\d+.\\d+.*)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
use auxiliary/scanner/mysql/mysql_login | ||
Stopping all jobs... | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306 | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42 | ||
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved! | ||
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password' | ||
[*] MySQL session 4 opened (127.0.0.1:37171 -> 127.0.0.1:3306) at 2024-04-19 16:36:47 +0000 | ||
use auxiliary/scanner/mysql/mysql_version | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful. | ||
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully. | ||
[*] Auxiliary module execution completed | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run session=4 Verbose=true | ||
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> [+] 127.0.0.1:3306 is running MySQL 5.5.42-MariaDB-1~wheezy-log | ||
[*] Scanned 1 of 1 hosts (100% complete) | ||
[*] Auxiliary module execution completed | ||
sessions -K | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[*] 127.0.0.1 - MySQL session 4 closed. | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
use auxiliary/scanner/mysql/mysql_hashdump | ||
Stopping all jobs... | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_hashdump[0m) [0m> run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true | ||
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_hashdump[0m) [0m> [+] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - Logged in to '' with 'root':'password' | ||
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved! | ||
[*] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - querying with 'SELECT @@version' | ||
[*] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - querying with 'SELECT user,password from mysql.user' | ||
[+] 127.0.0.1:3306 - Saving HashString as Loot: root:*2470C0C06DEE42FD1618BB99005ADCA2EC9D1E19 | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] Auxiliary module execution completed | ||
sessions -K | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_hashdump[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_hashdump[0m) [0m> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
use auxiliary/scanner/mysql/mysql_login | ||
Stopping all jobs... | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306 | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42 | ||
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved! | ||
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password' | ||
[*] MySQL session 2 opened (127.0.0.1:35281 -> 127.0.0.1:3306) at 2024-04-19 16:36:47 +0000 | ||
use auxiliary/scanner/mysql/mysql_version | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful. | ||
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully. | ||
[*] Auxiliary module execution completed | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run session=2 Verbose=true | ||
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> [+] 127.0.0.1:3306 is running MySQL 5.5.42 | ||
[*] Scanned 1 of 1 hosts (100% complete) | ||
[*] Auxiliary module execution completed | ||
sessions -K | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[*] 127.0.0.1 - MySQL session 2 closed. | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
## Load test modules | ||
loadpath test/modules | ||
|
||
## Session module | ||
use auxiliary/scanner/mysql/mysql_login | ||
|
||
## Set global datastore | ||
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
|
||
## Run command | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 | ||
|
||
|
||
## Replication commands | ||
use auxiliary/scanner/mysql/mysql_version | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:Saving HashString as Loot)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
## Load test modules | ||
loadpath test/modules | ||
|
||
## Session module | ||
use auxiliary/scanner/mysql/mysql_login | ||
|
||
## Set global datastore | ||
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
|
||
## Run command | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 | ||
|
||
|
||
## Replication commands | ||
use auxiliary/admin/mysql/mysql_sql | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.