MSSQL
Nmap discovered a MSSQL server on the target port 1433
The running service is Microsoft SQL Server 2022 16.00.1115.00; RC0+
┌──(kali㉿kali)-[~/archive/htb/labs/blazorized]
└─$ nmap --script ms-sql-info,ms-sql-empty-password,ms-sql-xp-cmdshell,ms-sql-config,ms-sql-ntlm-info,ms-sql-tables,ms-sql-hasdbaccess,ms-sql-dac,ms-sql-dump-hashes --script-args mssql.instance-port=1433,mssql.username=sa,mssql.password=,mssql.instance-name=MSSQLSERVER,ms-sql-xp-cmdshell.cmd=whoami -sV -p 1433 $IP
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-02 14:34 CEST
Nmap scan report for dc1.blazorized.htb (10.10.11.22)
Host is up (0.029s latency).
Bug in ms-sql-hasdbaccess: no string output.
Bug in ms-sql-dac: no string output.
PORT STATE SERVICE VERSION
1433/tcp open ms-sql-s Microsoft SQL Server 2022 16.00.1115.00; RC0+
| ms-sql-tables:
| 10.10.11.22\BLAZORIZED:
|_[10.10.11.22\BLAZORIZED]
| ms-sql-config:
| 10.10.11.22\BLAZORIZED:
|_ ERROR: Bad username or password
| ms-sql-dump-hashes:
|_ 10.10.11.22\BLAZORIZED: ERROR: Bad username or password
| ms-sql-info:
| 10.10.11.22\BLAZORIZED:
| Instance name: BLAZORIZED
| Version:
| name: Microsoft SQL Server 2022 RC0+
| number: 16.00.1115.00
| Product: Microsoft SQL Server 2022
| Service pack level: RC0
| Post-SP patches applied: true
| TCP port: 1433
|_ Clustered: false
| ms-sql-empty-password:
|_ 10.10.11.22\BLAZORIZED:
| ms-sql-ntlm-info:
| 10.10.11.22\BLAZORIZED:
| Target_Name: BLAZORIZED
| NetBIOS_Domain_Name: BLAZORIZED
| NetBIOS_Computer_Name: DC1
| DNS_Domain_Name: blazorized.htb
| DNS_Computer_Name: DC1.blazorized.htb
| DNS_Tree_Name: blazorized.htb
|_ Product_Version: 10.0.17763
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 16.53 seconds
Additional Nmap scan does not reveal any additional information. A valid credential is required to proceed forward