Pentest and exploit Microsoft SQL servers. More information: https://www.netexec.wiki/mssql-protocol.
nxc mssql 192.168.178.2 -u path/to/usernames.txt -p path/to/passwords.txt
nxc mssql 192.168.178.2 -u username -p password --query 'SELECT * FROM sys.databases;'
nxc mssql 192.168.178.2 -u username -p password -x whoami
nxc mssql 192.168.178.2 -u username -p password -X whoami --no-output
nxc mssql 192.168.178.2 -u username -p password --get-file C:\path\to\remote_file path/to/local_file
nxc mssql 192.168.178.2 -u username -p password --put-file path/to/local_file C:\path\to\remote_file