Port: 1433
Administered with SQL Server Management Studio (SSMS)
Default service: NT SERVICE\MSSQLSERVER
Query format: T-SQL (Transact SQL)
sa credentials. Admins may forget to disable this accountNmap:
nmap --script ms-sql-info,ms-sql-empty-password,ms-sql-xp-cmdshell,ms-sql-config,ms-sql-ntlm-info,ms-sql-tables,ms-sql-hasdbaccess,ms-sql-dac,ms-sql-dump-hashes --script-args mssql.instance-port=1433,mssql.username=sa,mssql.password=,mssql.instance-name=MSSQLSERVER -sV -p 1433 $HOST
Or mssql_ping on MSF
Client: mssqlclient.py
WriteUp:
Enumerate the target using the concepts taught in this section. List the hostname of MSSQL server.
In Nmap scan from above
Connect to the MSSQL instance running on the target using the account (backdoor:Password1), then list the non-default database present on the server