-
Notifications
You must be signed in to change notification settings - Fork 14.1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
0 parents
commit bbcef7d
Showing
3,226 changed files
with
2,072,763 additions
and
0 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
docs.metasploit.com |
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
## Load test modules | ||
loadpath test/modules | ||
|
||
## Session module | ||
use auxiliary/scanner/mysql/mysql_login | ||
|
||
## Set global datastore | ||
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
|
||
## Run command | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 | ||
|
||
|
||
## Replication commands | ||
use auxiliary/scanner/mysql/mysql_hashdump | ||
run session=4 Verbose=true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:\\| \\d+.\\d+.*)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:Saving HashString as Loot)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
## Load test modules | ||
loadpath test/modules | ||
|
||
## Session module | ||
use auxiliary/scanner/mysql/mysql_login | ||
|
||
## Set global datastore | ||
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
|
||
## Run command | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 | ||
|
||
|
||
## Replication commands | ||
use auxiliary/admin/mysql/mysql_enum | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:Saving HashString as Loot)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:(?-mix:\\d+\\.\\d+\\.\\d+\\.\\d+:\\d+) is running MySQL \\d+.\\d+.*)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:(?-mix:\\d+\\.\\d+\\.\\d+\\.\\d+:\\d+) is running MySQL \\d+.\\d+.*)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
## Load test modules | ||
loadpath test/modules | ||
|
||
## Session module | ||
use auxiliary/scanner/mysql/mysql_login | ||
|
||
## Set global datastore | ||
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
|
||
## Run command | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 | ||
|
||
|
||
## Replication commands | ||
use auxiliary/scanner/mysql/mysql_hashdump | ||
run session=3 Verbose=true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
use auxiliary/scanner/mysql/mysql_login | ||
Stopping all jobs... | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306 | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42 | ||
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved! | ||
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password' | ||
[*] MySQL session 4 opened (127.0.0.1:37171 -> 127.0.0.1:3306) at 2024-04-19 16:36:47 +0000 | ||
use auxiliary/scanner/mysql/mysql_version | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful. | ||
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully. | ||
[*] Auxiliary module execution completed | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run session=4 Verbose=true | ||
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> [+] 127.0.0.1:3306 is running MySQL 5.5.42-MariaDB-1~wheezy-log | ||
[*] Scanned 1 of 1 hosts (100% complete) | ||
[*] Auxiliary module execution completed | ||
sessions -K | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[*] 127.0.0.1 - MySQL session 4 closed. | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
use auxiliary/scanner/mysql/mysql_hashdump | ||
Stopping all jobs... | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_hashdump[0m) [0m> run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true | ||
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_hashdump[0m) [0m> [+] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - Logged in to '' with 'root':'password' | ||
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved! | ||
[*] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - querying with 'SELECT @@version' | ||
[*] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - querying with 'SELECT user,password from mysql.user' | ||
[+] 127.0.0.1:3306 - Saving HashString as Loot: root:*2470C0C06DEE42FD1618BB99005ADCA2EC9D1E19 | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] Auxiliary module execution completed | ||
sessions -K | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_hashdump[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_hashdump[0m) [0m> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
use auxiliary/scanner/mysql/mysql_login | ||
Stopping all jobs... | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306 | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42 | ||
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved! | ||
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password' | ||
[*] MySQL session 2 opened (127.0.0.1:35281 -> 127.0.0.1:3306) at 2024-04-19 16:36:47 +0000 | ||
use auxiliary/scanner/mysql/mysql_version | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful. | ||
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully. | ||
[*] Auxiliary module execution completed | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run session=2 Verbose=true | ||
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> [+] 127.0.0.1:3306 is running MySQL 5.5.42 | ||
[*] Scanned 1 of 1 hosts (100% complete) | ||
[*] Auxiliary module execution completed | ||
sessions -K | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[*] 127.0.0.1 - MySQL session 2 closed. | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
## Load test modules | ||
loadpath test/modules | ||
|
||
## Session module | ||
use auxiliary/scanner/mysql/mysql_login | ||
|
||
## Set global datastore | ||
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
|
||
## Run command | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 | ||
|
||
|
||
## Replication commands | ||
use auxiliary/scanner/mysql/mysql_version | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:Saving HashString as Loot)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
## Load test modules | ||
loadpath test/modules | ||
|
||
## Session module | ||
use auxiliary/scanner/mysql/mysql_login | ||
|
||
## Set global datastore | ||
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
|
||
## Run command | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 | ||
|
||
|
||
## Replication commands | ||
use auxiliary/admin/mysql/mysql_sql | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
## Load test modules | ||
loadpath test/modules | ||
|
||
## Session module | ||
use auxiliary/scanner/mysql/mysql_login | ||
|
||
## Set global datastore | ||
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
|
||
## Run command | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 | ||
|
||
|
||
## Replication commands | ||
use auxiliary/admin/mysql/mysql_sql | ||
run session=1 Verbose=true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{ | ||
"required_lines": [ | ||
{ | ||
"values": [ | ||
"(?-mix:Saving HashString as Loot)" | ||
], | ||
"options": { | ||
} | ||
} | ||
], | ||
"known_failures": [ | ||
|
||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
## Load test modules | ||
loadpath test/modules | ||
|
||
## Session module | ||
use auxiliary/scanner/mysql/mysql_login | ||
|
||
## Set global datastore | ||
irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
|
||
## Run command | ||
run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 | ||
|
||
|
||
## Replication commands | ||
use auxiliary/scanner/mysql/mysql_version | ||
run session=4 Verbose=true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
use auxiliary/scanner/mysql/mysql_login | ||
Stopping all jobs... | ||
[4mmsf6[0m auxiliary([1m[31madmin/mysql/mysql_sql[0m) [0m> irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306 | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42 | ||
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved! | ||
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password' | ||
[*] MySQL session 1 opened (127.0.0.1:46715 -> 127.0.0.1:3306) at 2024-04-19 16:36:47 +0000 | ||
use auxiliary/admin/mysql/mysql_sql | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful. | ||
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully. | ||
[*] Auxiliary module execution completed | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run session=1 Verbose=true | ||
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST | ||
[4mmsf6[0m auxiliary([1m[31madmin/mysql/mysql_sql[0m) [0m> [*] Using existing session 1 | ||
[*] Sending statement: 'select version()'... | ||
[*] 127.0.0.1:3306 MySQL - querying with 'select version()' | ||
[*] | 5.5.42 | | ||
[*] Auxiliary module execution completed | ||
sessions -K | ||
[4mmsf6[0m auxiliary([1m[31madmin/mysql/mysql_sql[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[*] 127.0.0.1 - MySQL session 1 closed. | ||
[4mmsf6[0m auxiliary([1m[31madmin/mysql/mysql_sql[0m) [0m> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
use auxiliary/scanner/mysql/mysql_login | ||
Stopping all jobs... | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_version[0m) [0m> irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306 | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 8.3.0 | ||
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved! | ||
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password' | ||
[*] MySQL session 3 opened (127.0.0.1:45215 -> 127.0.0.1:3306) at 2024-04-19 16:36:54 +0000 | ||
use post/test/mysql | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful. | ||
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully. | ||
[*] Auxiliary module execution completed | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run session=3 Verbose=true | ||
[4mmsf6[0m post([1m[31mtest/mysql[0m) [0m> [*] Running against session 3 | ||
[*] Session type is mysql and platform is Linux | ||
[+] should support the help command | ||
[+] should return a version | ||
[*] Testing complete in 0.04 seconds | ||
[*] Passed: 2; Failed: 0; Skipped: 0 | ||
[*] Post module execution completed | ||
sessions -K | ||
[4mmsf6[0m post([1m[31mtest/mysql[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[*] 127.0.0.1 - MySQL session 3 closed. | ||
[4mmsf6[0m post([1m[31mtest/mysql[0m) [0m> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
Calling `DidYouMean::SPELL_CHECKERS.merge!(error_name => spell_checker)' has been deprecated. Please call `DidYouMean.correct_error(error_name, spell_checker)' instead. | ||
Calling `DidYouMean::SPELL_CHECKERS.merge!(error_name => spell_checker)' has been deprecated. Please call `DidYouMean.correct_error(error_name, spell_checker)' instead. | ||
Overriding user environment variable 'OPENSSL_CONF' to enable legacy functions. | ||
[4mmsf6[0m [0m> loadpath test/modules | ||
Loaded 43 modules: | ||
14 auxiliary modules | ||
13 exploit modules | ||
16 post modules | ||
[4mmsf6[0m [0m> features set mysql_session_type true | ||
mysql_session_type => true | ||
[!] Run the save command and restart the console for this feature to take effect. | ||
[4mmsf6[0m [0m> use auxiliary/scanner/mysql/mysql_login | ||
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear' | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306 | ||
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42 | ||
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved! | ||
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password' | ||
[*] MySQL session 1 opened (127.0.0.1:43175 -> 127.0.0.1:3306) at 2024-04-19 16:36:45 +0000 | ||
use post/test/mysql | ||
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete) | ||
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful. | ||
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully. | ||
[*] Auxiliary module execution completed | ||
[4mmsf6[0m auxiliary([1m[31mscanner/mysql/mysql_login[0m) [0m> run session=1 Verbose=true | ||
[4mmsf6[0m post([1m[31mtest/mysql[0m) [0m> [*] Running against session 1 | ||
[*] Session type is mysql and platform is Linux | ||
[+] should support the help command | ||
[+] should return a version | ||
[*] Testing complete in 0.02 seconds | ||
[*] Passed: 2; Failed: 0; Skipped: 0 | ||
[*] Post module execution completed | ||
sessions -K | ||
[4mmsf6[0m post([1m[31mtest/mysql[0m) [0m> jobs -K | ||
[*] Killing all sessions... | ||
[*] 127.0.0.1 - MySQL session 1 closed. | ||
[4mmsf6[0m post([1m[31mtest/mysql[0m) [0m> |
Oops, something went wrong.