MSSQL scan and exploit module in MSF

Source: Internet
Author: User
Tags microsoft sql server mssql sql injection microsoft iis

Auxiliary/admin/mssql/mssql_enum normal Microsoft SQL Server Configuration Enumerator

auxiliary/admin/mssql/mssql_enum_domain_accounts normal Microsoft SQL Server suser_sname Windows domain account En Umeration

Auxiliary/admin/mssql/mssql_enum_domain_accounts_sqli Microsoft SQL Server sqli suser_sname Windows domain account Enumeration

Auxiliary/admin/mssql/mssql_enum_sql_logins normal Microsoft SQL Server SUSER_SNAME SQL Logins Enumeration

Auxiliary/admin/mssql/mssql_escalate_dbowner normal Microsoft sql Server escalate Db_Owner

Auxiliary/admin/mssql/mssql_escalate_dbowner_sqli normal Microsoft SQL Server sqli escalate Db_Owner

auxiliary/admin/mssql/mssql_escalate_execute_as normal Microsoft SQL Server escalate execute AS

Auxiliary/admin/mssql/mssql_escalate_execute_as_sqli normal Microsoft SQL Server sqli escalate EXECUTE AS

auxiliary/admin/mssql/mssql_exec normal Microsoft sql Server xp_cmdshell Command execution

Auxiliary/admin/mssql/mssql_findandsampledata normal Microsoft SQL Server Find and Sample Data

AUXILIARY/ADMIN/MSSQL/MSSQL_IDF normal Microsoft sql Server interesting Data Finder

Auxiliary/admin/mssql/mssql_ntlm_stealer normal Microsoft SQL Server NTLM stealer

Auxiliary/admin/mssql/mssql_ntlm_stealer_sqli normal Microsoft SQL Server sqli NTLM stealer

Auxiliary/admin/mssql/mssql_sql normal Microsoft sql Server Generic Query

Auxiliary/admin/mssql/mssql_sql_file normal Microsoft SQL Server Generic Query from File

Auxiliary/analyze/jtr_mssql_fast normal John The Ripper MS SQL Password cracker (Fast Mode)

Auxiliary/gather/lansweeper_collector Normal Lansweeper credential collector

Auxiliary/scanner/mssql/mssql_hashdump Normal MSSQL Password Hashdump

Auxiliary/scanner/mssql/mssql_login Normal MSSQL Login Utility

auxiliary/scanner/mssql/mssql_ping Normal MSSQL Ping Utility

Auxiliary/scanner/mssql/mssql_schemadump Normal MSSQL Schema Dump

Auxiliary/server/capture/mssql Normal authentication Capture:mssql

EXPLOIT/WINDOWS/IIS/MSADC excellent ms99-025 Microsoft IIS MDAC msadcs.dll RDS arbitrary Remote Command Execution

Exploit/windows/mssql/lyris_listmanager_weak_pass 2005-12-08 excellent lyris listmanager MSDE weak sa Password

Exploit/windows/mssql/ms02_039_slammer 2002-07-24 Good ms02-039 Microsoft SQL Server Resolution Overflow

Exploit/windows/mssql/ms02_056_hello 2002-08-05 Good ms02-056 Microsoft SQL Server Hello Overflow

Exploit/windows/mssql/ms09_004_sp_replwritetovarbin 2008-12-09 Good ms09-004 Microsoft SQL Server sp_ Replwritetovarbin Memory corruption

Exploit/windows/mssql/ms09_004_sp_replwritetovarbin_sqli 2008-12-09 excellent MS09-004 Microsoft SQL Server sp_ Replwritetovarbin Memory corruption via SQL injection

Exploit/windows/mssql/mssql_clr_payload 1999-01-01 excellent Microsoft sql Server CLR Stored Procedure Payload Execution

Exploit/windows/mssql/mssql_linkcrawler 2000-01-01 great Microsoft sql Server Database Link crawling Command executio N

Exploit/windows/mssql/mssql_payload 2000-05-30 excellent Microsoft SQL Server payload execution

Exploit/windows/mssql/mssql_payload_sqli 2000-05-30 excellent Microsoft SQL Server payload execution via SQL Inject Ion

Post/windows/gather/credentials/mssql_local_hashdump normal windows gather local SQL Server Hash Dump

Post/windows/manage/mssql_local_auth_bypass normal Windows manage local Microsoft SQL Server Authorization Bypass


MSSQL scan and exploit module in MSF

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.