CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/auxiliary/scanner/mysql/mysql_version.md
Views: 11784

Description

This module, as its name implies, scans a host or range of hosts to determine the version of MySQL that is running.

Verification Steps

  1. Do: use auxiliary/scanner/mysql/mysql_version

  2. Do: set RHOSTS [IP]

  3. Do: set THREADS [number of threads]

  4. Do: run

Scenarios

msf > use auxiliary/scanner/mysql/mysql_version msf auxiliary(mysql_version) > set RHOSTS 192.168.1.200-254 RHOSTS => 192.168.1.200-254 msf auxiliary(mysql_version) > set THREADS 20 THREADS => 20 msf auxiliary(mysql_version) > run [*] 192.168.1.200:3306 is running MySQL 5.0.51a-3ubuntu5 (protocol 10) [*] 192.168.1.201:3306 is running MySQL, but responds with an error: \x04Host '192.168.1.101' is not allowed to connect to this MySQL server [*] Scanned 21 of 55 hosts (038% complete) [*] 192.168.1.203:3306 is running MySQL, but responds with an error: \x04Host '192.168.1.101' is not allowed to connect to this MySQL server [*] Scanned 22 of 55 hosts (040% complete) [*] Scanned 42 of 55 hosts (076% complete) [*] Scanned 44 of 55 hosts (080% complete) [*] Scanned 45 of 55 hosts (081% complete) [*] Scanned 48 of 55 hosts (087% complete) [*] Scanned 50 of 55 hosts (090% complete) [*] Scanned 51 of 55 hosts (092% complete) [*] Scanned 52 of 55 hosts (094% complete) [*] Scanned 55 of 55 hosts (100% complete) [*] Auxiliary module execution completed msf auxiliary(mysql_version) >