当前位置:网站首页>6-22 Vulnerability exploit - postgresql database password cracking
6-22 Vulnerability exploit - postgresql database password cracking
2022-07-31 15:33:00 【Mountain Rabbit 1】
Introduction to postgresql
PostgreSQL is a relational database, POSTGRES developed by the Department of Computing at the University of California, Berkeley, has now been renamed PostgreSQL, an object-relational database management system (ORDBMS) based on version 4.2.PostgreSQL supports most of the SQL standard and provides many other modern features: complex queries, foreign keys, triggers, views, transactional integrity, MVCC.Likewise, PostgreSQL can be extended in many ways, for example, by adding new data types, functions, operators, aggregate functions, and indexes.Free to use, modify, and distribute PostgreSQL, whether for private, commercial, or academic research use.
https://www.postgresql.org/
Probe target postgresql
Use nmap -sV -p 5432 IP address to detect the target postgresql version information.
nmap -sV -p 5432 192.168.1.105
By default, the port number of postgresql is 5432. After we detect postgresql, we will conduct a security test on postgresql. What we think of is to use the password dictionary to brute force postgresql
msf brute force postgresql
Use the postgresql_login module under msf to crack the postgresql login username and password
msfconsoleuse auxiliary/scanner/postgres/postgres_versionshow optionsset rhosts 192.168.1.105show optionsrun
The metersploit test is more refined, and the corresponding version is directly given, but it is not necessarily correct, because there is an error in the detection, we can roughly think it is the 8.3.x version
use auxiliary/scanner/postgres/postgres_loginshow optionsrun
When we get the username and password, we need to think about logging in with the username and password
Log in to postgresql
Using pyadmin client software to log in to postgresql
We can't connect to the database because the version is not supported, but we can also view, we can also use the command line tool to log in
In our future detection, we must detect multiple tools at the same time to ensure the accuracy of the tools
Our best defense against brute force cracking is to use a password composed of more complex alphanumeric symbols to prevent the corresponding brute force cracking, and we can set the range of IP addresses that can be logged in, so that we can filter out some unsafeAt the same time, we also need to monitor the log of the login, so that we can find out the problem and the location of the problem immediately if there is an abnormal login.
边栏推荐
- mysql黑窗口~建库建表
- Dialogue with Zhuang Biaowei: The first lesson of open source
- 为什么黑客领域几乎一片男生?
- R语言检验样本是否符合正态性(检验样本是否来自一个正态分布总体):shapiro.test函数检验样本是否符合正态分布(normality test)
- Deployment application life cycle and Pod health check
- Ubantu project 4: xshell, XFTP connected the virtual machine and set xshell copy and paste the shortcut
- ASP.NET Core 产生连续 Guid
- 删除表格数据或清空表格
- 使用 GraphiQL 可视化 GraphQL 架构
- Synchronized和volatile 面试简单汇总
猜你喜欢
随机推荐
女性服务社群产品设计
TRACE32 - SNOOPer-based variable logging
Matlab矩阵基本操作(定义,运算)
Word表格转到Excel中
7、常见面试口语提问问题汇总
t-sne 数据可视化网络中的部分参数+
ASP.NET Core 产生连续 Guid
Efficient use of RecyclerView Section 1
Excel快速对齐表格的中姓名(两个字姓名和三个字姓名对齐)
Grafana安装后web打开报错
what exactly is json (c# json)
org.apache.jasperException(could not initialize class org)
The normal form of the database (first normal form, second normal form, third normal form, BCNF normal form) "recommended collection"
工程流体力学复习
Vb how to connect mysql_vb how to connect to the database collection "advice"
AVH Deployment Practice (1) | Deploying the Flying Paddle Model on Arm Virtual Hardware
json到底是什么(c# json)
数据库的范式(第一范式,第二范式,第三范式,BCNF范式)「建议收藏」
OPPO在FaaS领域的探索与思考
The use of border controls