SQLRecon
SQLRecon is an incredibly helpful tool for MS SQL attacks. Here are some example of useful commands:
Database enumeration
recon.exe -a windows -s 127.0.0.1,1433 -m databases
1 | master | 4/8/2003 9:13:36 AM | C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\DATA\master.mdf |
2 | tempdb | 7/20/2023 1:40:55 AM | C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\DATA\tempdb.mdf |
3 | model | 4/8/2003 9:13:36 AM | C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\DATA\model.mdf |
4 | msdb | 9/24/2019 2:21:42 PM | C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\DATA\MSDBData.mdf |
5 | music | 7/6/2020 1:58:52 AM | C:\Program Files\Microsoft SQL Server\MSSQL15.SQLEXPRESS\MSSQL\DATA\music.mdf |recon.exe -a windows -s 127.0.0.1,1433 -m tables -o music
music | dbo | users | BASE TABLE |
music | dbo | songs | BASE TABLE |
music | dbo | sqlmapoutput | BASE TABLE |recon.exe -a windows -s 127.0.0.1,1433 -m query -o "use music; SELECT * FROM users"
0 | alice | pass123 |
1 | brett | pass123 |
2 | peter | pass123 |
3 | eric | pass123 |
4 | admin | pass123 |Generic query
Linked servers
Interact with linked server SQL27 as local user webapp11
Land a shell on remote server SQL27, using an authorised user
Tooling
Refer to SQLRecon's github page for a list of all commands:
Last updated