MySQL


Nmap discovered a MySQL server on the target port 3306

┌──(kali㉿kali)-[~/archive/thm/yearoftheowl]
└─$ nmap -sV -p 3306 --script mysql-audit,mysql-databases,mysql-dump-hashes,mysql-empty-password,mysql-enum,mysql-info,mysql-query,mysql-users,mysql-variables,mysql-vuln-cve2012-2122 $IP 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-09-09 16:33 CEST
Nmap scan report for 10.10.150.245
Host is up (0.042s latency).
 
PORT     STATE SERVICE VERSION
3306/tcp open  mysql?
| mysql-enum: 
|   Accounts: No valid accounts found
|_  Statistics: Performed 10 guesses in 3 seconds, average tps: 3.3
|_mysql-empty-password: Host 'ip-10-9-3-3.eu-west-1.compute.internal' is not allowed to connect to this MariaDB server
| fingerprint-strings: 
|   NULL: 
|_    Host 'ip-10-9-3-3.eu-west-1.compute.internal' is not allowed to connect to this MariaDB server
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port3306-TCP:V=7.94SVN%I=7%D=9/9%Time=66DF073C%P=x86_64-pc-linux-gnu%r(
SF:NULL,65,"a\0\0\x01\xffj\x04Host\x20'ip-10-9-3-3\.eu-west-1\.compute\.in
SF:ternal'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\x20Maria
SF:DB\x20server");
 
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 15.63 seconds

Performing an additional Nmap scan doesn’t reveal any notable information