MSSQL


Nmap discovered a MSSQL server on the target port 1433 The running service is Microsoft SQL Server 2022 16.00.1115.00; RC0+

┌──(kali㉿kali)-[~/archive/htb/labs/blazorized]
└─$ nmap --script ms-sql-info,ms-sql-empty-password,ms-sql-xp-cmdshell,ms-sql-config,ms-sql-ntlm-info,ms-sql-tables,ms-sql-hasdbaccess,ms-sql-dac,ms-sql-dump-hashes --script-args mssql.instance-port=1433,mssql.username=sa,mssql.password=,mssql.instance-name=MSSQLSERVER,ms-sql-xp-cmdshell.cmd=whoami -sV -p 1433 $IP
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-02 14:34 CEST
Nmap scan report for dc1.blazorized.htb (10.10.11.22)
Host is up (0.029s latency).
 
Bug in ms-sql-hasdbaccess: no string output.
Bug in ms-sql-dac: no string output.
PORT     STATE SERVICE  VERSION
1433/tcp open  ms-sql-s Microsoft SQL Server 2022 16.00.1115.00; RC0+
| ms-sql-tables: 
|   10.10.11.22\BLAZORIZED: 
|_[10.10.11.22\BLAZORIZED]
| ms-sql-config: 
|   10.10.11.22\BLAZORIZED: 
|_  ERROR: Bad username or password
| ms-sql-dump-hashes: 
|_  10.10.11.22\BLAZORIZED: ERROR: Bad username or password
| ms-sql-info: 
|   10.10.11.22\BLAZORIZED: 
|     Instance name: BLAZORIZED
|     Version: 
|       name: Microsoft SQL Server 2022 RC0+
|       number: 16.00.1115.00
|       Product: Microsoft SQL Server 2022
|       Service pack level: RC0
|       Post-SP patches applied: true
|     TCP port: 1433
|_    Clustered: false
| ms-sql-empty-password: 
|_  10.10.11.22\BLAZORIZED: 
| ms-sql-ntlm-info: 
|   10.10.11.22\BLAZORIZED: 
|     Target_Name: BLAZORIZED
|     NetBIOS_Domain_Name: BLAZORIZED
|     NetBIOS_Computer_Name: DC1
|     DNS_Domain_Name: blazorized.htb
|     DNS_Computer_Name: DC1.blazorized.htb
|     DNS_Tree_Name: blazorized.htb
|_    Product_Version: 10.0.17763
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 16.53 seconds

Additional Nmap scan does not reveal any additional information. A valid credential is required to proceed forward