Skip to content

Commit

Permalink
Update docs
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed Apr 19, 2024
1 parent 7725e5d commit 45bd1cf
Show file tree
Hide file tree
Showing 3,006 changed files with 8,175 additions and 6,354 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
Original file line number Diff line number Diff line change
Expand Up @@ -2,15 +2,15 @@
loadpath test/modules

## Session module
use auxiliary/scanner/mssql/mssql_login
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=sa password=yourStrong(!)Password rhost=127.0.0.1 rport=1433 database=master
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use auxiliary/admin/mssql/mssql_enum
use auxiliary/scanner/mysql/mysql_hashdump
run session=4 Verbose=true
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"required_lines": [
{
"values": [
"Instance Name:"
"(?-mix:\\| \\d+.\\d+.*)"
],
"options": {
}
Expand Down
14 changes: 14 additions & 0 deletions acceptance-tests/data/attachments/15bc72d619b2d772.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"required_lines": [
{
"values": [
"(?-mix:Saving HashString as Loot)"
],
"options": {
}
}
],
"known_failures": [

]
}
11 changes: 0 additions & 11 deletions acceptance-tests/data/attachments/184dc0cfc460971c.txt

This file was deleted.

16 changes: 16 additions & 0 deletions acceptance-tests/data/attachments/18e813b6a48c8e2b.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
## Load test modules
loadpath test/modules

## Session module
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use auxiliary/admin/mysql/mysql_enum
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
14 changes: 14 additions & 0 deletions acceptance-tests/data/attachments/199b1cf2fb24dde8.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"required_lines": [
{
"values": [
"(?-mix:Saving HashString as Loot)"
],
"options": {
}
}
],
"known_failures": [

]
}
14 changes: 14 additions & 0 deletions acceptance-tests/data/attachments/1a0b9d99f4fce892.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"required_lines": [
{
"values": [
"(?-mix:(?-mix:\\d+\\.\\d+\\.\\d+\\.\\d+:\\d+) is running MySQL \\d+.\\d+.*)"
],
"options": {
}
}
],
"known_failures": [

]
}
14 changes: 14 additions & 0 deletions acceptance-tests/data/attachments/1c03078162b1bf3b.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"required_lines": [
{
"values": [
"(?-mix:(?-mix:\\d+\\.\\d+\\.\\d+\\.\\d+:\\d+) is running MySQL \\d+.\\d+.*)"
],
"options": {
}
}
],
"known_failures": [

]
}
Original file line number Diff line number Diff line change
Expand Up @@ -2,15 +2,15 @@
loadpath test/modules

## Session module
use auxiliary/scanner/mssql/mssql_login
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=sa password=yourStrong(!)Password rhost=127.0.0.1 rport=1433 database=master
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use auxiliary/admin/mssql/mssql_enum
use auxiliary/scanner/mysql/mysql_hashdump
run session=3 Verbose=true
24 changes: 24 additions & 0 deletions acceptance-tests/data/attachments/1c2800eff4738f9d.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
use auxiliary/scanner/mysql/mysql_login
Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_version) > irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session
msf6 auxiliary(scanner/mysql/mysql_login) > run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306
msf6 auxiliary(scanner/mysql/mysql_login) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password'
[*] MySQL session 4 opened (127.0.0.1:37171 -> 127.0.0.1:3306) at 2024-04-19 16:36:47 +0000
use auxiliary/scanner/mysql/mysql_version
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful.
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully.
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/mysql/mysql_login) > run session=4 Verbose=true
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(scanner/mysql/mysql_version) > [+] 127.0.0.1:3306 is running MySQL 5.5.42-MariaDB-1~wheezy-log
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
sessions -K
msf6 auxiliary(scanner/mysql/mysql_version) > jobs -K
[*] Killing all sessions...
[*] 127.0.0.1 - MySQL session 4 closed.
msf6 auxiliary(scanner/mysql/mysql_version) >
39 changes: 0 additions & 39 deletions acceptance-tests/data/attachments/1d8e8c05569830f4.txt

This file was deleted.

15 changes: 15 additions & 0 deletions acceptance-tests/data/attachments/1faec60d5a88f1eb.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
use auxiliary/scanner/mysql/mysql_hashdump
Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_hashdump) > run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(scanner/mysql/mysql_hashdump) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - Logged in to '' with 'root':'password'
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[*] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - querying with 'SELECT @@version'
[*] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - querying with 'SELECT user,password from mysql.user'
[+] 127.0.0.1:3306 - Saving HashString as Loot: root:*2470C0C06DEE42FD1618BB99005ADCA2EC9D1E19
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
sessions -K
msf6 auxiliary(scanner/mysql/mysql_hashdump) > jobs -K
[*] Killing all sessions...
msf6 auxiliary(scanner/mysql/mysql_hashdump) >
24 changes: 24 additions & 0 deletions acceptance-tests/data/attachments/20f64c72e60f4374.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
use auxiliary/scanner/mysql/mysql_login
Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_version) > irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session
msf6 auxiliary(scanner/mysql/mysql_login) > run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306
msf6 auxiliary(scanner/mysql/mysql_login) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password'
[*] MySQL session 2 opened (127.0.0.1:35281 -> 127.0.0.1:3306) at 2024-04-19 16:36:47 +0000
use auxiliary/scanner/mysql/mysql_version
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful.
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully.
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/mysql/mysql_login) > run session=2 Verbose=true
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(scanner/mysql/mysql_version) > [+] 127.0.0.1:3306 is running MySQL 5.5.42
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
sessions -K
msf6 auxiliary(scanner/mysql/mysql_version) > jobs -K
[*] Killing all sessions...
[*] 127.0.0.1 - MySQL session 2 closed.
msf6 auxiliary(scanner/mysql/mysql_version) >
26 changes: 0 additions & 26 deletions acceptance-tests/data/attachments/2120361a09862b81.txt

This file was deleted.

16 changes: 16 additions & 0 deletions acceptance-tests/data/attachments/2134fcaed365ac94.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
## Load test modules
loadpath test/modules

## Session module
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use auxiliary/scanner/mysql/mysql_version
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
14 changes: 14 additions & 0 deletions acceptance-tests/data/attachments/222a88ee4af5a0fe.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
{
"required_lines": [
{
"values": [
"(?-mix:Saving HashString as Loot)"
],
"options": {
}
}
],
"known_failures": [

]
}
16 changes: 16 additions & 0 deletions acceptance-tests/data/attachments/2366114807dd1a6c.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
## Load test modules
loadpath test/modules

## Session module
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use auxiliary/admin/mysql/mysql_sql
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
35 changes: 0 additions & 35 deletions acceptance-tests/data/attachments/263f807c862410b1.txt

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -2,15 +2,15 @@
loadpath test/modules

## Session module
use auxiliary/scanner/mssql/mssql_login
use auxiliary/scanner/mysql/mysql_login

## Set global datastore
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'

## Run command
run lhost=127.0.0.1 username=sa password=yourStrong(!)Password rhost=127.0.0.1 rport=1433 database=master
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306


## Replication commands
use post/test/mssql
use auxiliary/admin/mysql/mysql_sql
run session=1 Verbose=true
Loading

0 comments on commit 45bd1cf

Please sign in to comment.