[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAFB=mGCSu7BxaRTJ2xvq36fHSOBtRAoy1_QSpEj9fpKpGsQQsg@mail.gmail.com>
Date: Sat, 6 Oct 2012 07:47:21 +0200
From: king cope <isowarez.isowarez.isowarez@...glemail.com>
To: submit@...sec.com, full-disclosure@...ts.grok.org.uk
Subject: -== MySQL Brute Force Account Scanner ==-
from the README file:
MySQL Login Scanner
By Kingcope
Scans for open mysql servers with the following credentials:
root <nopass>
root mysql
root root
admin <nopass>
admin admin
admin mysql
mysql <nopass>
mysql mysql
Can be useful to dump dox as there are always plenty servers in a range!
Runs on linux.
Requirements: mysql development libraries and headers
Compile:
./configure LIBS=-lmysqlclient
make linux
Run:
./sslog -v
./synscan -b <ip block> -p 3306
Inspect Logfile "mysqljack.pot" for open servers.
Download attachment "synscan-5.02_MYSQL_FINAL.zip" of type "application/zip" (73118 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists