Sodamhan.com

TL;DR

nxc mssql

Pentest and exploit Microsoft SQL servers. More information: https://www.netexec.wiki/mssql-protocol.

  • Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:

nxc mssql 192.168.178.2 -u path/to/usernames.txt -p path/to/passwords.txt

  • Execute the specified SQL query on the target server:

nxc mssql 192.168.178.2 -u username -p password --query 'SELECT * FROM sys.databases;'

  • Execute the specified shell command on the target server through MSSQL:

nxc mssql 192.168.178.2 -u username -p password -x whoami

  • Execute the specified PowerShell command on the target server through MSSQL without retrieving output:

nxc mssql 192.168.178.2 -u username -p password -X whoami --no-output

  • Download a remote file from the target server and store it in the specified location:

nxc mssql 192.168.178.2 -u username -p password --get-file C:\path\to\remote_file path/to/local_file

  • Upload a local file to the specified location on the target server:

nxc mssql 192.168.178.2 -u username -p password --put-file path/to/local_file C:\path\to\remote_file

This document was created using the contents of the tldr project.