commands.sh

nxc mssql

all

Pentest and exploit Microsoft SQL servers.

More info →

Options (3)

-u, --usernameboolean

Search for valid credentials by trying out every combination in the specified lists of usernames and passwords

Example: nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}
-p, --passwordboolean

Search for valid credentials by trying out every combination in the specified lists of usernames and passwords

Example: nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}
-q, --queryboolean

Execute the specified SQL query on the target server

Example: nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} {{[-q|--query]}} '{{SELECT * FROM sys.databases;}}'

Examples (6)

Search for valid credentials by trying out every combination in the specified lists of usernames and passwords

nxc mssql 192.168.178.2 [-u|--username] path/to/usernames.txt [-p|--password] path/to/passwords.txt

Execute the specified SQL query on the target server

nxc mssql 192.168.178.2 [-u|--username] username [-p|--password] password [-q|--query] 'SELECT * FROM sys.databases;'

Execute the specified shell command on the target server through MSSQL

nxc mssql 192.168.178.2 [-u|--username] username [-p|--password] password -x whoami

Execute the specified PowerShell command on the target server through MSSQL without retrieving output

nxc mssql 192.168.178.2 [-u|--username] username [-p|--password] password -X whoami --no-output

Download a remote file from the target server and store it in the specified location

nxc mssql 192.168.178.2 [-u|--username] username [-p|--password] password --get-file C:\path\to\remote_file path/to/local_file

Upload a local file to the specified location on the target server

nxc mssql 192.168.178.2 [-u|--username] username [-p|--password] password --put-file path/to/local_file C:\path\to\remote_file
made by @shridhargupta | data from tldr-pages