Skip to content

Commit

Permalink
Update docs
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed May 9, 2024
1 parent 9dd688e commit 0adda7a
Show file tree
Hide file tree
Showing 2,979 changed files with 16,824 additions and 12,368 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -13,4 +13,4 @@ run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306

## Replication commands
use auxiliary/scanner/mysql/mysql_version
run session=3 Verbose=true
run session=4 Verbose=true
Original file line number Diff line number Diff line change
Expand Up @@ -13,4 +13,4 @@ run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306

## Replication commands
use post/test/mysql
run session=1 Verbose=true
run session=3 Verbose=true
Original file line number Diff line number Diff line change
Expand Up @@ -6,21 +6,21 @@ Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_login) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password'
[*] MySQL session 4 opened (127.0.0.1:39701 -> 127.0.0.1:3306) at 2024-05-02 08:40:26 +0000
use auxiliary/admin/mysql/mysql_sql
[*] MySQL session 2 opened (127.0.0.1:36009 -> 127.0.0.1:3306) at 2024-05-09 12:16:22 +0000
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful.
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully.
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/mysql/mysql_login) > run session=4 Verbose=true
msf6 auxiliary(scanner/mysql/mysql_login) > use auxiliary/admin/mysql/mysql_sql
run session=2 Verbose=true
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(admin/mysql/mysql_sql) > [*] Using existing session 4
msf6 auxiliary(admin/mysql/mysql_sql) > [*] Using existing session 2
[*] Sending statement: 'select version()'...
[*] 127.0.0.1:3306 MySQL - querying with 'select version()'
[*] | 5.5.42 |
[*] Auxiliary module execution completed
sessions -K
msf6 auxiliary(admin/mysql/mysql_sql) > jobs -K
[*] Killing all sessions...
[*] 127.0.0.1 - MySQL session 4 closed.
[*] 127.0.0.1 - MySQL session 2 closed.
msf6 auxiliary(admin/mysql/mysql_sql) >
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
use auxiliary/admin/mysql/mysql_enum
Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_version) > run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
msf6 auxiliary(admin/mysql/mysql_sql) > run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(admin/mysql/mysql_enum) > [*] Running module against 127.0.0.1
[+] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - Logged in to '' with 'root':'password'
Expand All @@ -10,7 +10,7 @@ Stopping all jobs...
[*] 127.0.0.1:3306 - MySQL Version: 11.3.2-MariaDB-1:11.3.2+maria~ubu2204
[*] 127.0.0.1:3306 - Compiled for the following OS: debian-linux-gnu
[*] 127.0.0.1:3306 - Architecture: x86_64
[*] 127.0.0.1:3306 - Server Hostname: ca8645ba2028
[*] 127.0.0.1:3306 - Server Hostname: ba6306661377
[*] 127.0.0.1:3306 - Data Directory: /var/lib/mysql/
[*] 127.0.0.1:3306 - Logging of queries and logins: ON
[*] 127.0.0.1:3306 - Log Files Location: OFF
Expand All @@ -32,9 +32,9 @@ Stopping all jobs...
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[+] 127.0.0.1:3306 - User: root Host: localhost Password Hash: *2470C0C06DEE42FD1618BB99005ADCA2EC9D1E19
[+] 127.0.0.1:3306 - User: root Host: % Password Hash: *2470C0C06DEE42FD1618BB99005ADCA2EC9D1E19
[+] 127.0.0.1:3306 - User: healthcheck Host: 127.0.0.1 Password Hash: *A8AB1309DAF0335EC941306AC6A6D5E2380FB6C5
[+] 127.0.0.1:3306 - User: healthcheck Host: ::1 Password Hash: *A8AB1309DAF0335EC941306AC6A6D5E2380FB6C5
[+] 127.0.0.1:3306 - User: healthcheck Host: localhost Password Hash: *A8AB1309DAF0335EC941306AC6A6D5E2380FB6C5
[+] 127.0.0.1:3306 - User: healthcheck Host: 127.0.0.1 Password Hash: *334F68210D50581A2EE080F911417A8F8D982DC4
[+] 127.0.0.1:3306 - User: healthcheck Host: ::1 Password Hash: *334F68210D50581A2EE080F911417A8F8D982DC4
[+] 127.0.0.1:3306 - User: healthcheck Host: localhost Password Hash: *334F68210D50581A2EE080F911417A8F8D982DC4
[*] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - querying with 'select user, host, ssl_type from mysql.user where
(ssl_type = 'ANY') or
(ssl_type = 'X509') or
Expand Down
37 changes: 0 additions & 37 deletions acceptance-tests/data/attachments/28b8586871d1935a.txt

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -13,4 +13,4 @@ run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306

## Replication commands
use post/test/mysql
run session=1 Verbose=true
run session=4 Verbose=true
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
use auxiliary/scanner/mysql/mysql_version
Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_version) > run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
msf6 auxiliary(admin/mysql/mysql_sql) > run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(scanner/mysql/mysql_version) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 is running MySQL 5.5.42 (protocol 10)
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,22 +6,22 @@ Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_login) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 11.3.2
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password'
[*] MySQL session 3 opened (127.0.0.1:33449 -> 127.0.0.1:3306) at 2024-05-02 08:40:26 +0000
[*] MySQL session 2 opened (127.0.0.1:40649 -> 127.0.0.1:3306) at 2024-05-09 12:17:50 +0000
use auxiliary/admin/mysql/mysql_enum
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful.
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully.
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/mysql/mysql_login) > run session=3 Verbose=true
msf6 auxiliary(scanner/mysql/mysql_login) > run session=2 Verbose=true
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(admin/mysql/mysql_enum) > [*] Using existing session 3
msf6 auxiliary(admin/mysql/mysql_enum) > [*] Using existing session 2
[*] Running MySQL Enumerator...
[*] Enumerating Parameters
[*] 127.0.0.1:3306 MySQL - querying with 'show variables'
[*] MySQL Version: 11.3.2-MariaDB-1:11.3.2+maria~ubu2204
[*] Compiled for the following OS: debian-linux-gnu
[*] Architecture: x86_64
[*] Server Hostname: ca8645ba2028
[*] Server Hostname: ba6306661377
[*] Data Directory: /var/lib/mysql/
[*] Logging of queries and logins: ON
[*] Log Files Location: OFF
Expand All @@ -43,9 +43,9 @@ use auxiliary/admin/mysql/mysql_enum
[!] No active DB -- Credential data will not be saved!
[+] User: root Host: localhost Password Hash: *2470C0C06DEE42FD1618BB99005ADCA2EC9D1E19
[+] User: root Host: % Password Hash: *2470C0C06DEE42FD1618BB99005ADCA2EC9D1E19
[+] User: healthcheck Host: 127.0.0.1 Password Hash: *A8AB1309DAF0335EC941306AC6A6D5E2380FB6C5
[+] User: healthcheck Host: ::1 Password Hash: *A8AB1309DAF0335EC941306AC6A6D5E2380FB6C5
[+] User: healthcheck Host: localhost Password Hash: *A8AB1309DAF0335EC941306AC6A6D5E2380FB6C5
[+] User: healthcheck Host: 127.0.0.1 Password Hash: *334F68210D50581A2EE080F911417A8F8D982DC4
[+] User: healthcheck Host: ::1 Password Hash: *334F68210D50581A2EE080F911417A8F8D982DC4
[+] User: healthcheck Host: localhost Password Hash: *334F68210D50581A2EE080F911417A8F8D982DC4
[*] 127.0.0.1:3306 MySQL - querying with 'select user, host, ssl_type from mysql.user where
(ssl_type = 'ANY') or
(ssl_type = 'X509') or
Expand Down Expand Up @@ -100,5 +100,5 @@ use auxiliary/admin/mysql/mysql_enum
sessions -K
msf6 auxiliary(admin/mysql/mysql_enum) > jobs -K
[*] Killing all sessions...
[*] 127.0.0.1 - MySQL session 3 closed.
[*] 127.0.0.1 - MySQL session 2 closed.
msf6 auxiliary(admin/mysql/mysql_enum) >
27 changes: 27 additions & 0 deletions acceptance-tests/data/attachments/3c85004945374008.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
use auxiliary/scanner/mysql/mysql_login
Stopping all jobs...
msf6 auxiliary(admin/mysql/mysql_enum) > irb -e '(self.respond_to?(:framework) ? framework : self).datastore.user_defined.clear'
[*] New in Metasploit 6.4 - The CreateSession option within this module can open an interactive session
msf6 auxiliary(scanner/mysql/mysql_login) > run PASS_FILE= USER_FILE= CreateSession=true username=root password=password rhost=127.0.0.1 rport=3306
msf6 auxiliary(scanner/mysql/mysql_login) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 11.3.2
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password'
[*] MySQL session 3 opened (127.0.0.1:43851 -> 127.0.0.1:3306) at 2024-05-09 12:17:51 +0000
use post/test/mysql
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful.
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully.
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/mysql/mysql_login) > run session=3 Verbose=true
msf6 post(test/mysql) > [*] Running against session 3
[*] Session type is mysql and platform is Linux
[+] should return a version
[+] should support the help command
[*] Testing complete in 0.02 seconds
[*] Passed: 2; Failed: 0; Skipped: 0
[*] Post module execution completed
sessions -K
msf6 post(test/mysql) > jobs -K
[*] Killing all sessions...
[*] 127.0.0.1 - MySQL session 3 closed.
msf6 post(test/mysql) >
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
use auxiliary/scanner/mysql/mysql_version
Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_version) > run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
msf6 post(test/mysql) > run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(scanner/mysql/mysql_version) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 is running MySQL 8.4.0 (protocol 10)
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
Expand Down
15 changes: 0 additions & 15 deletions acceptance-tests/data/attachments/3d8cfc7a7f1dd2c7.txt

This file was deleted.

25 changes: 25 additions & 0 deletions acceptance-tests/data/attachments/3fe0cc1e9769914f.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
Calling `DidYouMean::SPELL_CHECKERS.merge!(error_name => spell_checker)' has been deprecated. Please call `DidYouMean.correct_error(error_name, spell_checker)' instead.
Calling `DidYouMean::SPELL_CHECKERS.merge!(error_name => spell_checker)' has been deprecated. Please call `DidYouMean.correct_error(error_name, spell_checker)' instead.
Overriding user environment variable 'OPENSSL_CONF' to enable legacy functions.
msf6 > loadpath test/modules
Loaded 43 modules:
14 auxiliary modules
13 exploit modules
16 post modules
msf6 > features set mysql_session_type true
mysql_session_type => true
[!] Run the save command and restart the console for this feature to take effect.
msf6 > use auxiliary/scanner/mysql/mysql_hashdump
[*] New in Metasploit 6.4 - This module can target a SESSION or an RHOST
msf6 auxiliary(scanner/mysql/mysql_hashdump) > run lhost=127.0.0.1 username=root password=password rhost=127.0.0.1 rport=3306 Verbose=true
[+] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - Logged in to '' with 'root':'password'
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[*] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - querying with 'SELECT @@version'
[*] 127.0.0.1:3306 - 127.0.0.1:3306 MySQL - querying with 'SELECT user,password from mysql.user'
[+] 127.0.0.1:3306 - Saving HashString as Loot: root:*2470C0C06DEE42FD1618BB99005ADCA2EC9D1E19
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
sessions -K
msf6 auxiliary(scanner/mysql/mysql_hashdump) > jobs -K
[*] Killing all sessions...
msf6 auxiliary(scanner/mysql/mysql_hashdump) >
Original file line number Diff line number Diff line change
Expand Up @@ -6,14 +6,14 @@ Stopping all jobs...
msf6 auxiliary(scanner/mysql/mysql_login) > [+] 127.0.0.1:3306 - 127.0.0.1:3306 - Found remote MySQL version 5.5.42
[!] 127.0.0.1:3306 - No active DB -- Credential data will not be saved!
[+] 127.0.0.1:3306 - 127.0.0.1:3306 - Success: 'root:password'
[*] MySQL session 2 opened (127.0.0.1:35223 -> 127.0.0.1:3306) at 2024-05-02 08:40:22 +0000
[*] MySQL session 4 opened (127.0.0.1:42829 -> 127.0.0.1:3306) at 2024-05-09 12:16:22 +0000
use post/test/mysql
[*] 127.0.0.1:3306 - Scanned 1 of 1 hosts (100% complete)
[*] 127.0.0.1:3306 - Bruteforce completed, 1 credential was successful.
[*] 127.0.0.1:3306 - 1 MySQL session was opened successfully.
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/mysql/mysql_login) > run session=2 Verbose=true
msf6 post(test/mysql) > [*] Running against session 2
msf6 auxiliary(scanner/mysql/mysql_login) > run session=4 Verbose=true
msf6 post(test/mysql) > [*] Running against session 4
[*] Session type is mysql and platform is Linux
[+] should return a version
[+] should support the help command
Expand All @@ -23,5 +23,5 @@ use post/test/mysql
sessions -K
msf6 post(test/mysql) > jobs -K
[*] Killing all sessions...
[*] 127.0.0.1 - MySQL session 2 closed.
[*] 127.0.0.1 - MySQL session 4 closed.
msf6 post(test/mysql) >
Loading

0 comments on commit 0adda7a

Please sign in to comment.