-
Notifications
You must be signed in to change notification settings - Fork 476
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added new commands in data/cheats #87
base: master
Are you sure you want to change the base?
Added new commands in data/cheats #87
Conversation
…et-mssqlclient on cheats
|
||
% impacket, windows, exec, inital_access | ||
|
||
Mssqlclient.py is an MSSQL client, supporting both SQL and Windows Authentications (including hashes) allowing the enumeration for Microsoft SQL servers including spawning an 'xp_cmdshell'. It also supports TLS. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi, thanks for the pull request ! 👍
Can you remove this line, as it is interpreted by Arsenal please ?
## Allow for the SQL Server instance without password | ||
#plateform/linux #target/remote #port/1433 #protocol/mssql #cat/ATTACK/EXPLOIT | ||
|
||
``` | ||
mssqlclient.py <DOMAIN>/<USERNAME>:<PASSWORD>@<IP> -no-pass | ||
``` | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you remove this one, as we will not put all of the different commands in arsenal
## Attempts to use the IP address of the domain controller to be used for authentication | ||
#plateform/linux #target/remote #port/1433 #protocol/mssql #cat/ATTACK/EXPLOIT | ||
|
||
``` | ||
mssqlclient.py <DOMAIN>/<USERNAME>:<PASSWORD>@<IP> -dc-ip <IP> | ||
``` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This one is not really useful in my opinion, could you also remove it ?
Example : hashid '5f4dcc3b5aa765d61d8327deb882cf99' | ||
|
||
https://github.com/blackploit/hash-identifier |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It will also be interpreted by arsenal, could you remove this part ?
#plateform/linux #target/remote #port/1433 #protocol/mssql #cat/ATTACK/EXPLOIT | ||
|
||
``` | ||
mssqlclient.py <DOMAIN>/<USERNAME>:<PASSWORD>@<IP> -k |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think that for kerberos authentication, password is not needed, and the option -no-pass could be added
hashid '<hash-value>' -m | ||
``` | ||
|
||
## Print hashes in joh mode |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
john instead of joh
hashid '<hash-value>' -j | ||
``` | ||
|
||
## write output to file |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you capitalize the first word please ? 😄
## Write output to file
|
||
#plateform/linux #target/local #cat/HASHES/HASH_TYPE_IDENTIFIER | ||
|
||
https://github.com/HashPals/Name-That-Hash |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you remove it, it might cause unintended behaviors from Arsenal
## Enable verbosity/debug logs | ||
``` | ||
nth --text '<hash-value>' -v | ||
``` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I do not think this one is useful, could you remove it ? 😄
|
||
## Decode hashes in base64 | ||
``` | ||
nth --text '<base6d_encoded_hash>' -b64 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
do you mean base64_encoded_hash ?
Will make amendment to all said changes and re-commit, Thanks |
Hello @sec-fortress , thanks for your contrib ! |
Added a new hash identifier folder with hash function identifiers (hashid and nth), then added impacket-mssqlclient on data/cheats