What is the password of the user we found during our enumeration stage?
“alejandro”
Great! Now, let's SSH into the server as the user, what is contents of smtp.txt
"THM{who_knew_email_servers_were_c00l?}"
Task 8 Understanding MySQL
What type of software is MySQL?
“relational database management system”
What language is MySQL based on?
“sql”
What communication model does MySQL use?
“client-server”
What is a common application of MySQL?
“back end database”
What major social network uses MySQL as their back-end database? This will require further research.
“Facebook”
Task 9 Enumerating MySQL
As always, let's start out with a port scan, so we know what port the service we're trying to attack is running on. What port is MySQL using?
"3306"
Search for, select and list the options it needs. What three options do we need to set?
“password/rhosts/username”
Run the exploit. By default it will test with the "select version()" command, what result does this give you?
“5.7.29-0ubuntu0.18.04.1”
Great! We know that our exploit is landing as planned. Let's try to gain some more ambitious information. Change the "sql" option to "show databases". how many databases are returned?
“4”
Task 10 Exploiting MySQL
First, let's search for and select the "mysql_schemadump" module. What's the module's full name?
“auxiliary/scanner/mysql/mysql_schemadump”
Great! Now, you've done this a few times by now so I'll let you take it from here. Set the relevant options, run the exploit. What's the name of the last table that gets dumped?
“x$waits_global_by_latency”
Awesome, you have now dumped the tables, and column names of the whole database. But we can do one better... search for and select the "mysql_hashdump" module. What's the module's full name?
“auxiliary/scanner/mysql/mysql_hashdump”
Again, I'll let you take it from here. Set the relevant options, run the exploit. What non-default user stands out to you?
“carl”
What is the user/hash combination string?
“carl:*EA031893AA21444B170FC2162A56978B8CEECE18”
Now, we need to crack the password! Let's try John the Ripper against it using: "john hash.txt" what is the password of the user we found?