当前位置:网站首页>web渗透测试----5、暴力破解漏洞--(7)MYSQL密码破解
web渗透测试----5、暴力破解漏洞--(7)MYSQL密码破解
2022-06-24 03:34:00 【七天啊】
MySQL是一个关系型数据库管理系统,由瑞典MySQL AB 公司开发,属于 Oracle 旗下产品。MySQL 是最流行的关系型数据库管理系统之一,在 WEB 应用方面,MySQL是最好的 RDBMS (Relational Database Management System,关系数据库管理系统) 应用软件之一。
MySQL是一种关系型数据库管理系统,关系数据库将数据保存在不同的表中,而不是将所有数据放在一个大仓库内,这样就增加了速度并提高了灵活性。默认端口:3306。
一、hydra
Hydra 是一个并行的登录破解器,它支持多种攻击协议。它非常快速和灵活,并且新模块很容易添加。kali工具集已集成。
hydra项目地址:
https://github.com/vanhauser-thc/thc-hydra/releases全版本
hydra支持:
Cisco AAA、Cisco auth、Cisco enable、CVS、FTP、HTTP(S)-FORM-GET、HTTP(S)-FORM-POST、HTTP(S)-GET、HTTP(S)-HEAD、HTTP-代理、ICQ、IMAP、IRC、LDAP、MS-SQL、MySQL、NNTP、Oracle 侦听器、Oracle SID、PC-Anywhere、PC-NFS、POP3、PostgreSQL、RDP、Rexec、Rlogin、Rsh、SIP、SMB(NT)、SMTP、SMTP 枚举、SNMP v1+v2+v3、SOCKS5、SSH(v1 和 v2)、SSHKEY、Subversion、Teamspeak (TS2)、Telnet、VMware-Auth、VNC 和 XMPP`。
hydra –L /root/Desktop/user.txt –P /root/Desktop/pass.txt IP mysql
-L:指定用户名字典路径-P:指定密码字典路径
二、Ncrack
Ncrack是一款高速网络认证破解工具。它旨在通过主动测试其所有主机和网络设备的密码错误来帮助公司保护其网络。Ncrack 是使用模块化方法、类似于 Nmap 的命令行语法和可以根据网络反馈调整其行为的动态引擎设计的。它允许对多个主机进行快速而可靠的大规模审计。kali工具集已集成。
Ncrack 的功能包括一个非常灵活的界面,允许用户完全控制网络操作,允许非常复杂的暴力破解攻击,易于使用的定时模板,类似于 Nmap 的运行时交互等等。支持的协议包括
SSH、RDP、FTP、Telnet、HTTP(S)、Wordpress、POP3(S)、IMAP、CVS、SMB、VNC、SIP、Redis、PostgreSQL、MQTT、MySQL、MSSQL、MongoDB、Cassandra、WinRM、OWA , 和 DICOM
ncrack –U /root/Desktop/user.txt -P /root/Desktop/pass.txt IP -p 3306
-U:表示用户名列表的路径-P:表示密码列表的路径
三、Medusa
Medusa 是一个快速、并行和模块化的登录暴力破解器。目标是支持尽可能多的允许远程身份验证的服务。kalikali工具集已集成。
文档:
www.foofus.net/jmk/medusa/medusa.html
源代码:https://github.com/jmk-foofus/medusahttps://github.com/jmk-foofus/medusa/archive/2.2.tar.gz
主要功能如下:
1、基于线程的并行测试:可以同时针对多个主机、用户或密码执行蛮力测试。
2、灵活的用户输入:可以通过多种方式指定目标信息(主机/用户/密码)。例如,每个项目可以是单个条目,也可以是包含多个条目的文件。此外,组合文件格式允许用户细化他们的目标列表。
3、模块化设计:每个服务模块作为一个独立的 .mod 文件存在。这意味着无需对核心应用程序进行任何修改即可扩展支持的服务列表以进行暴力破解。
4、支持多种协议:当前支持许多服务(例如 SMB、HTTP、POP3、MS-SQL、SSHv2 等)。
medusa -h IP –U /root/Desktop/user.txt –P /root/Desktop/pass.txt –M mysql
-U:表示用户名列表的路径-P:表示密码列表的路径-M:指定爆破参数类型
四、Metasploit
msf > use auxiliary/scanner/mysql/mysql_login
msf auxiliary(mysql_login) > set rhosts IP
msf auxiliary(mysql_login) > set user_file /root/Desktop/user.txt
msf auxiliary(mysql_login) > set pass_file /root/Desktop/pass.txt
msf auxiliary(mysql_login) > set stop_on_success true
msf auxiliary(mysql_login) > run
边栏推荐
- What is the all-in-one backup machine? How about its cost performance
- What does the cloud desktop server do? What are the cloud desktop functions
- EIP maximum EIP EIP remote desktop access
- Is the cloud desktop server highly required for installation and configuration? Is cloud desktop easy to use?
- Grpc: how to make grpc provide swagger UI?
- System library golang Org/x/time/rate frequency limiter bug
- New Google brain research: how does reinforcement learning learn to observe with sound?
- JMeter uses JDBC to perform database pressure test
- What is the price of the elastic public network IP bandwidth
- Principle of efficient animation Implementation-A preliminary exploration of jetpack compose
猜你喜欢

Simple and beautiful weather code

Ar 3D map technology

Get to know MySQL database
![[summary of interview questions] zj5](/img/d8/ece82f8b2479adb948ba706f6f5039.jpg)
[summary of interview questions] zj5

On Sunday, I rolled up the uni app "uview excellent UI framework"

Sorting out of key vulnerabilities identified by CMS in the peripheral management of red team (I)

Community pycharm installation visual database

QT creator tips
![[summary of interview questions] zj6 redis](/img/4b/eadf66ca8d834f049f3546d348fa32.jpg)
[summary of interview questions] zj6 redis
随机推荐
Liaoyuan social cloud primary actual combat camp test environment script
Where is the cloud game server? Can individuals rent cloud game servers?
How to solve the problem of easycvr playing the total recording time in the specified time period?
What are the responsibilities of cloud desktop administrators? How to use cloud desktop?
What does elastic scaling of cloud computing mean? What are the application scenarios for elastic scaling of cloud computing?
QT creator tips
[Tencent cloud update] against 11.11! Here comes the 1.1% discount for enterprises!
How is intelligent character recognition realized? Is the rate of intelligent character recognition high?
Process kill problem
How to design a hybrid system
What are the configuration requirements for cloud desktop servers? What are the main characteristics of the three points?
How does cloud computing achieve elastic scaling? What are the characteristics of elasticity?
Grp: how to add Prometheus monitoring in GRP service?
Is it necessary to buy EIP? Price analysis of EIP
Tencent cloud CIF engineering effectiveness summit was successfully opened, and coding released a series of new products
What is the edge calculator force? What about the edge calculator?
What is the GPU usage for cloud desktops and servers? What can cloud desktop do?
What is the difference between server leasing and hosting?
Tke accesses the cluster through kubectl in pod
Windowsvpn client is coveted by vulnerabilities, 53% of companies face supply chain attacks | global network security hotspot