当前位置:网站首页>6-21 vulnerability exploitation MySQL weak password cracking
6-21 vulnerability exploitation MySQL weak password cracking
2022-07-29 02:44:00 【Mountain Rabbit 1】

mysql Introduce
Mysql Is a relational database management system , The Swedish MySQL AB Companies to develop , At present belongs to the Oracle Its products .Mysql Is one of the most popular relational database management systems , stay WEB Application aspect ,mysql It's the best RDBMS(Relational Database Management System, Relational database management system ) Application software .
Each paragraph is stored in a table , The corresponding combination of multiple tables , Store the corresponding data , Internal key 、 Foreign keys 、 Unique index , Different values , There are corresponding connections , This is the outline of our relational database
Mysql Is a relational database management system , Relational databases keep data in different tables , Instead of storing all the data in a big warehouse , Non relational database ,mydbs、mongdb, Store data in large memory , Instead of storing it in a large table , They have no concept of table , Store in table , Is to improve the speed of search , And it has more flexibility
We can do it in mysql Official website , see mysql Information about :https://www.mysql.com/
Target detection mysql
Use nmap -sV -p 3306 IP Address , Default mysql Is running on the 3306 Of , Target detection mysql Version information .

nmap -sV -p 3306 192.168.42.137

msf Crack mysql password
Use msf Under the mysql_login Module cracking mysql Login username and password

msfconsole
use auxiliary/scanner/mysql/mysql_login
show options

set rhosts 192.168.1.105
show options

set user_file /home/kali/Desktop/user.txt
set pass_file /home/kali/Desktop/PASS.txt

show options
run

When we get it mysql After the user name and password , We can log in to mysql client , To view the database , Stored data
Log in to the database to view the data
Use mysql -h IP Address -u root Log in to the database system
mysql -h 192.168.1.105 -u root
show databases;

use dvwa;
show tables;
select * from users;

The above is the user name we cracked , Log in to the database , View the data
The reason why we can crack successfully , Because our database user name is too simple , User name used root This user , And the password is empty , Or other simple passwords , Are easy to crack , This is the time , We need to defend against such detection , You need to change the user name and password , The design is complicated , Make it not so easy to crack , And you can design thresholds , When we log in three times by mistake , Will block the corresponding IP, Limit login to ten minutes , In this way, it can't be cracked very quickly , It can't even be cracked , We can modify it mysql Default port ,3306, Design it into other ports , Confuse our detection , meanwhile , We don't allow mysql Outreach , Only through 127.0.0.1 Make local connections , Otherwise, do not connect , Or specify specific IP Address , Connect , Not arbitrary IP Can be connected to mysql On
边栏推荐
- ECCV 2022 | AirDet:无需微调的小样本目标检测方法
- 多年前的回忆
- Happy childhood
- CatchAdmin实战教程(四)Table组件相关功能实现
- Qt编写物联网管理平台48-特色功能设计
- 以科技传递温度,vivo亮相数字中国建设峰会
- QT screen adaptive automatic layout, drag the window to automatically grow larger and smaller (I)
- Teach you how to install vscode by hand (with illustrated steps)
- When synchronized encounters this thing, there is a big hole, so be careful
- Redis主从模式、哨兵集群、分片集群
猜你喜欢

STM32C8T6编码器电机测速与arduino光电模块测速

一文理解分布式开发中的服务治理

第七天笔记

九宫格心形拼图小程序源码/带流量主微信小程序源码

Talk about the implementation principle of feign

QT screen adaptive automatic layout, drag the window to automatically grow larger and smaller (I)

家庭亲戚关系计算器微信小程序源码

Production scheme and advantages of online 3D digital exhibition hall

一文搞懂 Redis 架构演化之路

矿山开采虚拟现实vr安全培训提升员工警惕性和防护意识
随机推荐
[quality] code quality evaluation standard
新版海螺影视主题模板M3.1全解密版本多功能苹果CMSv10后台自适应主题开源全解密版
QT qstringlist usage
第六天笔记
线上3d数字展厅制作方案及优点
qt QStringList用法
The outsourcing company "mixed" for two years, and I only did five things seriously. Now I get byte offer smoothly.
Source code and display of 18 classic programs in C language vs2019
[untitled]
Kbxxxxx is not necessarily a patch, but also a description of a solution to a problem
FPGA skimming memory (Verilog implementation of ram and FIFO)
第九天笔记
Why is redis fast? Message queue, single thread
K210——声源定位、声音识别
工程经济学名词解释
一文读懂Okaleido Tiger近期动态,挖掘背后价值与潜力
ASEMI整流桥S25VB100,S25VB100参数,S25VB100应用
Redis队列实现秒杀
Servlet三种实现方式
用于校园流浪猫信息记录和分享的小程序源码/微信云开发中大猫谱小程序源码