Skip to content

A few questions for MySQL default login brute force scan #6158

Closed Answered by pussycat0x
Caratpine asked this question in Q&A
Discussion options

You must be logged in to vote

Hi @Caratpine I've made some modifications to your template — please find the updated version below.

Tested Nuclei Version : v3.4.2

id: mysql-default-login

info:
  name: MySQL - Default Login
  author: DhiyaneshDk,pussycat0x,ritikchaddha
  severity: high
  description: |
    A MySQL service was accessed with easily guessed credentials.
  metadata:
    verified: true
    max-request: 21
    shodan-query: "port:3306"
  tags: js,mysql,default-login,network,enum

javascript:
  - pre-condition: |
      isPortOpen(Host,Port);
    code: |
      var m = require("nuclei/mysql");
        var c = m.MySQLClient();
        try {
          c.Connect(Host,Port,User,Pass,pom);
        } catch (err) {
  …

Replies: 2 comments

Comment options

You must be logged in to vote
0 replies
Answer selected by pussycat0x
Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants