{"id":979,"date":"2015-08-27T10:41:01","date_gmt":"2015-08-27T08:41:01","guid":{"rendered":"http:\/\/www.ayhanarda.com\/blog\/?p=979"},"modified":"2015-08-27T10:41:01","modified_gmt":"2015-08-27T08:41:01","slug":"setoolkit-ile-mssql-sifresi-bulma","status":"publish","type":"post","link":"https:\/\/www.ayhanarda.com\/blog\/2015\/08\/setoolkit-ile-mssql-sifresi-bulma\/","title":{"rendered":"Setoolkit ile Mssql \u015eifresi Bulma"},"content":{"rendered":"<p>Setoolkit i genellikle phishing sayfalar\u0131 i\u00e7in mi kullan\u0131yorsunuz , setoolkit ile mssql \u015fifresi bulmaya ne dersiniz? Yine bu i\u015flem i\u00e7in setoolkit in haz\u0131r kurulu geldi\u011fi kali linux da\u011f\u0131t\u0131m\u0131n\u0131 kullan\u0131yorum , setoolkit i a\u00e7mak ile ba\u015flayal\u0131m.<\/p>\n<p>root@ayhanarda:\/# <strong>setoolkit<\/strong><\/p>\n<p>Kar\u015f\u0131m\u0131za bir men\u00fc gelecek.<\/p>\n<p>1) Social-Engineering Attacks<br \/>\n2) <strong>Fast-Track Penetration Testing<\/strong><br \/>\n3) Third Party Modules<br \/>\n4) Update the Social-Engineer Toolkit<br \/>\n5) Update SET configuration<br \/>\n6) Help, Credits, and About<\/p>\n<p>99) Exit the Social-Engineer Toolkit<\/p>\n<p>Mssql \u015fifre denemeleri yapmas\u0131 i\u00e7in <strong>2<\/strong> numaral\u0131 se\u00e7enek ile devam ediyoruz ve a\u015fa\u011f\u0131daki men\u00fcye ula\u015f\u0131yoruz.<\/p>\n<p>1) <strong>Microsoft SQL Bruter<\/strong><br \/>\n2) Custom Exploits<br \/>\n3) SCCM Attack Vector<br \/>\n4) Dell DRAC\/Chassis Default Checker<br \/>\n5) RID_ENUM &#8211; User Enumeration Attack<br \/>\n6) PSEXEC Powershell Injection<\/p>\n<p>99) Return to Main Menu<\/p>\n<p>Yukar\u0131da a\u00e7\u0131lan men\u00fcde <strong>1<\/strong> nolu se\u00e7enek ile devam edelim ve a\u015fa\u011f\u0131daki men\u00fcye ula\u015fal\u0131m.<\/p>\n<p>1) <strong>Scan and Attack MSSQL<\/strong><br \/>\n2) Connect directly to MSSQL<\/p>\n<p>99) Return to Main Menu<\/p>\n<p>Yukar\u0131daki men\u00fcde <strong>1<\/strong> nolu se\u00e7enek ile devam edelim ve a\u015fa\u011f\u0131daki men\u00fcye ula\u015fal\u0131m.<\/p>\n<p>1. Scan IP address or CIDR<br \/>\n2. <strong>Import file that contains SQL Server IP addresses<\/strong><\/p>\n<p>\u015eimdi yukar\u0131da diyor ki , ben network teki ip adreslerini mi taray\u0131p sql kurulu sunucu bulay\u0131m yoksa sen mi deneme yapmak istedi\u011fin sql server ip adresini bir dosyaya yaz\u0131p bana s\u00f6ylemek istersin , ben burada <strong>2<\/strong> nolu se\u00e7enek ile devam edece\u011fim. Mssql server ip adresinin 192.168.1.15 oldu\u011funu varsayal\u0131m ve mssql portu 1433 olsun , olu\u015fturaca\u011f\u0131m\u0131z dosya i\u00e7eri\u011fi a\u015fa\u011f\u0131daki gibi olmal\u0131.<\/p>\n<p>root@ayhanarda:~# <strong>cat \/root\/sql.txt<\/strong><br \/>\n192.168.1.15:1433<\/p>\n<p>Dosyam\u0131z haz\u0131r ise <strong>2<\/strong> nolu se\u00e7ene\u011fi se\u00e7tikten sonra a\u015fa\u011f\u0131daki b\u00f6l\u00fcm a\u00e7\u0131lacak ve bizden dosyan\u0131n yolunu isteyecek.\u00d6rnekteki gibi yazabilirsiniz.<\/p>\n<p>set:fasttrack:mssql:scan&gt; Enter filename for SQL servers (ex. \/root\/sql.txt &#8211; note can be in format of ipaddr:port):<strong>\/root\/sql.txt<\/strong><\/p>\n<p>Dosya yolunu yazd\u0131ktan sonra denemek i\u00e7in bir \u015fifre listemiz olup olmad\u0131\u011f\u0131n\u0131 soracakt\u0131r , e\u011fer var ise yolunu belirtebilirsiniz , yok ise kendisi i\u00e7inde tan\u0131ml\u0131 \u015fifreleri s\u0131ras\u0131 ile deneyecektir , ben daha kolay bulabilmesi i\u00e7in bir sqlsifre.txt dosyas\u0131 haz\u0131rlad\u0131m ve i\u00e7ine do\u011fru olmayan \u015fifrelerin yan\u0131nda bir de do\u011frusunu koydum.<\/p>\n<p>\u015eifre dosyas\u0131 yolu belirttikten sonra k.adlar\u0131n\u0131 i\u00e7eren dosya yolunu soracakt\u0131r , yukar\u0131daki paragraf\u0131 tekrar inceleyebilirsiniz , e\u011fer dosya belirtmez iseniz <strong>sa<\/strong> kullan\u0131c\u0131 ad\u0131 ile deneyecektir. Bu i\u015flemden sonra enter a bast\u0131\u011f\u0131n\u0131zda hemen \u00e7al\u0131\u015fmaya ba\u015flayacak ve a\u015fa\u011f\u0131daki gibi sonu\u00e7 \u00fcretecektir.<\/p>\n<p>set:fasttrack:mssql:scan&gt; Enter filename for SQL servers (ex. \/root\/sql.txt &#8211; note can be in format of ipaddr:port):<strong>\/root\/sql.txt<\/strong><br \/>\nset:fasttrack:mssql:scan&gt; Enter path to a wordlist file [use default wordlist]:<strong>\/root\/sqlsifre.txt<\/strong><br \/>\nset:fasttrack:mssql:scan&gt; Enter the username to brute force or specify username file (\/root\/users.txt) [sa]:<strong>\/root\/user.lst\u00a0<\/strong><br \/>\nAttempting to brute force\u00a0 with username of admin and password of password<br \/>\nAttempting to brute force\u00a0 with username of admin and password of deneme<br \/>\nAttempting to brute force\u00a0 with username of admin and password of selambensifre<br \/>\n[!] Unable to guess the SQL password for 192.168.1.15 with username of admin<br \/>\nAttempting to brute force\u00a0 with username of root and password of password<br \/>\nAttempting to brute force\u00a0 with username of root and password of deneme<br \/>\nAttempting to brute force\u00a0 with username of root and password of selambensifre<br \/>\n[!] Unable to guess the SQL password for 192.168.1.15 with username of root<br \/>\nAttempting to brute force\u00a0 with username of selambenkullaniciadi and password of password<br \/>\nAttempting to brute force\u00a0 with username of selambenkullaniciadi and password of deneme<br \/>\nAttempting to brute force\u00a0 with username of selambenkullaniciadi and password of selambensifre<br \/>\n[*]<br \/>\n<strong>Successful login with username selambenkullaniciadi and password: selambensifre<\/strong><br \/>\nAttempting to brute force\u00a0 with username of ayhan_user and password of password<br \/>\nAttempting to brute force\u00a0 with username of ayhan_user and password of deneme<br \/>\nAttempting to brute force\u00a0 with username of ayhan_user and password of selambensifre<br \/>\n[!] Unable to guess the SQL password for 192.168.1.15 with username of ayhan_user<br \/>\n[*] Select the compromise SQL server you want to interact with:<\/p>\n<p>1. <strong>192.168.1.15\u00a0\u00a0 username: selambenkullaniciadi | password: selambensifre\u00a0\u00a0 SQLPort: 1433<\/strong><\/p>\n<p>99. Return back to the main menu.<\/p>\n<p>G\u00f6r\u00fcld\u00fc\u011f\u00fc \u00fczere \u015fifre yukar\u0131da belirtilmi\u015ftir.<\/p>\n<p>Ayhan ARDA<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_toolbar\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/tr\/share-medium.png\" style=\"border:0px; padding-top: 5px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_t=new Array(\"Twitter\",\"Facebook\",\"Google Plus\",\"Pinterest\",\"Linkedin\");var hupso_background_t=\"#EAF4FF\";var hupso_border_t=\"#66CCFF\";var hupso_toolbar_size_t=\"medium\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"ayhanarda\";var hupso_url_t=\"\";var hupso_title_t=\"Setoolkit%20ile%20Mssql%20%C5%9Eifresi%20Bulma\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/share_toolbar.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"Setoolkit i genellikle phishing sayfalar\u0131 i\u00e7in mi kullan\u0131yorsunuz , setoolkit ile mssql \u015fifresi bulmaya ne dersiniz? Yine bu i\u015flem i\u00e7in setoolkit in haz\u0131r kurulu geldi\u011fi kali linux da\u011f\u0131t\u0131m\u0131n\u0131 kullan\u0131yorum , setoolkit i a\u00e7mak ile ba\u015flayal\u0131m. root@ayhanarda:\/# setoolkit Kar\u015f\u0131m\u0131za bir men\u00fc gelecek. 1) Social-Engineering Attacks 2) Fast-Track Penetration Testing 3) Third Party Modules 4) Update the [&hellip;]","protected":false},"author":1,"featured_media":981,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[482,313],"tags":[835,827,831,836,830,829,833,834,837,828,832],"class_list":["post-979","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mssql-2","category-security","tag-fast-track-penetration-testing","tag-kali-hack","tag-kali-mssql-hack","tag-microsoft-sql-bruter","tag-mssql-bruteforce","tag-mssql-hack","tag-mssql-sifre-bulma","tag-mssql-sifre-denemeleri","tag-scan-and-attack-mssql","tag-setoolkit","tag-using-setoolkit"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ayhanarda.com\/blog\/wp-json\/wp\/v2\/posts\/979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ayhanarda.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ayhanarda.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ayhanarda.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ayhanarda.com\/blog\/wp-json\/wp\/v2\/comments?post=979"}],"version-history":[{"count":1,"href":"https:\/\/www.ayhanarda.com\/blog\/wp-json\/wp\/v2\/posts\/979\/revisions"}],"predecessor-version":[{"id":982,"href":"https:\/\/www.ayhanarda.com\/blog\/wp-json\/wp\/v2\/posts\/979\/revisions\/982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ayhanarda.com\/blog\/wp-json\/wp\/v2\/media\/981"}],"wp:attachment":[{"href":"https:\/\/www.ayhanarda.com\/blog\/wp-json\/wp\/v2\/media?parent=979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ayhanarda.com\/blog\/wp-json\/wp\/v2\/categories?post=979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ayhanarda.com\/blog\/wp-json\/wp\/v2\/tags?post=979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}