MSSQL

May 15, 2024

# Nmap 7.94 scan initiated Thu May 16 00:34:13 2024 as: nmap -sC -sV -oN nmap -p 1433 10.129.118.59
Nmap scan report for 10.129.118.59
Host is up (0.79s latency).

PORT     STATE SERVICE  VERSION
1433/tcp open  ms-sql-s Microsoft SQL Server 2019 15.00.2000.00; RTM
| ms-sql-info: 
|   10.129.118.59:1433: 
|     Version: 
|       name: Microsoft SQL Server 2019 RTM
|       number: 15.00.2000.00
|       Product: Microsoft SQL Server 2019
|       Service pack level: RTM
|       Post-SP patches applied: false
|_    TCP port: 1433
|_ssl-date: 2024-05-15T16:34:32+00:00; +5s from scanner time.
| ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback
| Not valid before: 2024-05-15T16:32:52
|_Not valid after:  2054-05-15T16:32:52
| ms-sql-ntlm-info: 
|   10.129.118.59:1433: 
|     Target_Name: ILF-SQL-01
|     NetBIOS_Domain_Name: ILF-SQL-01
|     NetBIOS_Computer_Name: ILF-SQL-01
|     DNS_Domain_Name: ILF-SQL-01
|     DNS_Computer_Name: ILF-SQL-01
|_    Product_Version: 10.0.17763

Host script results:
|_clock-skew: mean: 4s, deviation: 0s, median: 4s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Thu May 16 00:34:27 2024 -- 1 IP address (1 host up) scanned in 14.90 seconds
impacket-mssqlclient backdoor@10.129.118.59 -windows-auth
SELECT NAME FROM sys.sysdatabases

Last updated