当前位置:网站首页>Web penetration test - 5. Brute force cracking vulnerability - (7) MySQL password cracking
Web penetration test - 5. Brute force cracking vulnerability - (7) MySQL password cracking
2022-06-24 03:38:00 【Seven days】
List of articles
MySQL Is a relational database management system , The Swedish MySQL AB Companies to develop , Belong to Oracle Its products .MySQL Is one of the most popular relational database management systems , stay WEB Application aspect ,MySQL It's the best RDBMS (Relational Database Management System, Relational database management system ) One of the application software .
MySQL Is a relational database management system , Relational databases keep data in different tables , Instead of putting all the data in one big warehouse , This increases speed and flexibility . Default port :3306.
One 、hydra
Hydra Is a parallel login cracker , It supports multiple attack protocols . It's very fast and flexible , And new modules are easy to add .kali Toolset integrated .
hydra Project address :
https://github.com/vanhauser-thc/thc-hydra/releases Full version
hydra Support :
Cisco AAA、Cisco auth、Cisco enable、CVS、FTP、HTTP(S)-FORM-GET、HTTP(S)-FORM-POST、HTTP(S)-GET、HTTP(S)-HEAD、HTTP- agent 、ICQ、IMAP、IRC、LDAP、MS-SQL、MySQL、NNTP、Oracle The listener 、Oracle SID、PC-Anywhere、PC-NFS、POP3、PostgreSQL、RDP、Rexec、Rlogin、Rsh、SIP、SMB(NT)、SMTP、SMTP enumeration、SNMP v1+v2+v3、SOCKS5、SSH(v1 and v2)、SSHKEY、Subversion、Teamspeak (TS2)、Telnet、VMware-Auth、VNC and XMPP`.
hydra –L /root/Desktop/user.txt –P /root/Desktop/pass.txt IP mysql
-L: Specify the user name dictionary path-P: Specify password dictionary path
Two 、Ncrack
Ncrack Is a high-speed network authentication cracking tool . It aims to help companies protect their networks by proactively testing all their hosts and network devices for password errors .Ncrack Is to use a modular approach 、 Be similar to Nmap Command line syntax and dynamic engine design that can adjust its behavior according to network feedback . It allows fast and reliable large-scale auditing of multiple hosts .kali Toolset integrated .
Ncrack The functionality of the includes a very flexible interface , Allow users to have complete control over network operations , Allow very complex brute force attacks , Easy to use timing templates , Be similar to Nmap The runtime interaction of . Supported protocols include
SSH、RDP、FTP、Telnet、HTTP(S)、Wordpress、POP3(S)、IMAP、CVS、SMB、VNC、SIP、Redis、PostgreSQL、MQTT、MySQL、MSSQL、MongoDB、Cassandra、WinRM、OWA , and DICOM
Project address :
https://nmap.org/ncrack/
ncrack –U /root/Desktop/user.txt -P /root/Desktop/pass.txt IP -p 3306
-U: Indicates the path to the user name list-P: Indicates the path to the password list
3、 ... and 、Medusa
Medusa It's a fast one 、 A parallel and modular login brute force cracker . The goal is to support as many services as possible that allow remote authentication .kalikali Toolset integrated .
file :
www.foofus.net/jmk/medusa/medusa.html
Source code :https://github.com/jmk-foofus/medusahttps://github.com/jmk-foofus/medusa/archive/2.2.tar.gz
The main functions are as follows :
1、Thread based parallel testing: It can target multiple hosts at the same time 、 The user or password performs a brute force test .
2、Flexible user input: Target information can be specified in a number of ways ( host / user / password ). for example , Each item can be a single item , It can also be a file that contains multiple entries . Besides , The combined file format allows users to refine their target list .
3、Modular design: Each service module acts as an independent .mod File exists . This means that the list of supported services can be extended for brute force cracking without any modification to the core application .
4、Support multiple protocols: Many services are currently supported ( for example SMB、HTTP、POP3、MS-SQL、SSHv2 etc. ).
medusa -h IP –U /root/Desktop/user.txt –P /root/Desktop/pass.txt –M mysql
-U: Indicates the path to the user name list-P: Indicates the path to the password list-M: Specify the burst parameter type
Four 、Metasploit
msf > use auxiliary/scanner/mysql/mysql_login
msf auxiliary(mysql_login) > set rhosts IP
msf auxiliary(mysql_login) > set user_file /root/Desktop/user.txt
msf auxiliary(mysql_login) > set pass_file /root/Desktop/pass.txt
msf auxiliary(mysql_login) > set stop_on_success true
msf auxiliary(mysql_login) > run
边栏推荐
- Pits encountered in refactoring code (1)
- On Sunday, I rolled up the uni app "uview excellent UI framework"
- Koom of memory leak
- Why can't the fortress machine open the port? There is a problem with the use of the fortress machine port
- getLocationInWindow源码
- 老弹出explorer.exe遇到问题已停止工作,怎么办?
- Modstartcms theme introductory development tutorial
- Grp: how to add Prometheus monitoring in GRP service?
- halcon知识:区域(Region)上的轮廓算子(2)
- How to save pictures to CDN? What are the advantages of this?
猜你喜欢

Modstartcms theme introductory development tutorial

Community pycharm installation visual database

浅谈游戏安全 (一)

ModStartCMS 企业内容建站系统(支持 Laravel9)v4.2.0

你了解TLS协议吗?
Thank you for your recognition! One thank-you note after another

Modstartcms enterprise content site building system (supporting laravel9) v4.2.0

618大促:手机品牌“神仙打架”,高端市场“谁主沉浮”?

【代码随想录-动态规划】T392.判断子序列

halcon知识:区域(Region)上的轮廓算子(2)
随机推荐
How to choose excellent server hosting or server leasing in Beijing
Community pycharm installation visual database
Grpc: how to make grpc provide restful API services?
Why can't the fortress machine open the port? There is a problem with the use of the fortress machine port
web渗透测试----5、暴力破解漏洞--(7)MYSQL密码破解
Disk partition extension using graphical interface and PowerShell code
Hunan data security governance Summit Forum was held, and Tencent built the best practice of government enterprise data security
How do websites use CDN? What are the benefits of using it?
Grpc: how to add API log interceptors / Middleware?
No monitoring information seen in kibana
ModStartCMS 主题入门开发教程
Live broadcast Reservation: cloud hosting or cloud function, how can the business do a good job in technology selection?
Modstartcms theme introductory development tutorial
EIP maximum EIP EIP remote desktop access
Gaussian beam and its matlab simulation
Why does the fortress machine use an application publisher? What are the main functions of the fortress machine
LeetCode 129. Find the sum of numbers from root node to leaf node
[Tencent cloud update] against 11.11! Here comes the 1.1% discount for enterprises!
[new double 11] the latest interpretation of Tencent cloud double 11! Get 11000 yuan voucher now!!
Interpreting Tencent cloud product experience through user experience elements