Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Nmap NSE net: ms-sql-hasdbaccess

Information

Severity

Severity

Medium

Family

Family

Nmap NSE net

CVSSv2 Base

CVSSv2 Base

4.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:N/A:N

Solution Type

Solution Type

Mitigation

Created

Created

12 years ago

Modified

Modified

5 years ago

Summary

Queries Microsoft SQL Server (ms-sql) for a list of databases a user has access to. The script needs an account with the sysadmin server role to work. It needs to be fed credentials through the script arguments or from the scripts 'mssql-brute' or 'mssql-empty- password'. When run, the script iterates over the credentials and attempts to run the command until either all credentials are exhausted or until the command is executed. SYNTAX: mssql-hasdbaccess.limit: limits the amount of databases per-user that are returned (default 5). If set to zero or less all databases the user has access to are returned. mssql.password: specifies the password to use to connect to the server. This option overrides any accounts found by the 'ms-sql-brute' and 'ms-sql-empty-password' scripts. mssql.username: specifies the username to use to connect to the server. This option overrides any accounts found by the 'mssql-brute' and 'mssql-empty-password' scripts. mssql.timeout: How long to wait for SQL responses. This is a number followed by 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours. Default: '30s'.