Remote Exploitation
◾
175
You can see
that he used the same commands, HELO, MAIL FROM, RCPT, and DATA, to
get the job done.
Attacking SQL Servers
So far, we have discussed attacking TCP-based
protocols such as FTP, SSH, and SMTP. Now let’s
talk about a protocol based on UDP. SQL server is a UDP service that you would often encounter
in your penetration tests.
One of the first tests that we will perform is targeting the authentication. We will learn to
attack the authentication of SQL servers not only by using Hydra/Medusa, but some other tools
as well that can perform this task.
MySQL Servers
MySQL servers are the most widely used databases in modern web applications. You are likely to
find them in 8 out of 10 web applications that you perform penetration test against. One of the first
attacks is to, of course, test for weak credentials that can give us immediate access to the SQL database.
Dostları ilə paylaş: