MSSQL server
Background
MSSQL Local Authentication
MSSQL Windows Authentication
Checking Access
User and password
# with NetExec (Windows Auth)
nxc mssql $TARGETIP -u $USER -p $PASSWORD
# with NetExec (Local Auth)
nxc mssql $TARGETIP -u $USER -p $PASSWORD --local-auth
# with impacket-mssqlclient (USE SQL Auth)
mssqlclient.py $DOMAIN/$USER:$PASSWORD@$IP
# with impacket-mssqlclient (USE Windows Auth)
mssqlclient.py $DOMAIN/$USER:$PASSWORD@$IP -windows-authKerberos authentication
User Impersonation
xp_dirtree
This file has logs from the SQL server
Database Enumeration;
Cmd injection to RCE
RID BruteForce
Abusing Linked Servers:
Read Local Files:
Last updated