Title: SQL Server Port 1433 1434 open- Enumeration Guide used in Penetration TestingAuthor: ajayverma
SQL Enumeration
> piggy ( http://www.cqure.net/wp/?page_id=33 )
> SQLPing ( http://www.sqlsecurity.com/Tools/FreeTools/tabid/65/Default.aspx )
>> sqlping ip_address/hostname
> SQLPing2 ( http://www.sqlsecurity.com/Tools/FreeTools/tabid/65/Default.aspx )
> SQLPing3 ( http://www.sqlsecurity.com/Tools/FreeTools/tabid/65/Default.aspx )
> SQLpoke ( http://www.sqlsecurity.com/Tools/FreeTools/tabid/65/Default.aspx )
> SQL Recon ( http://www.specialopssecurity.com/labs/sqlrecon/1.0/down.php )
> SQLver ( http://www.sqlsecurity.com/Tools/FreeTools/tabid/65/Default.aspx )

SQL Brute Force
> SQLPAT ( http://www.cqure.net/wp/?page_id=16 )
sqlbf -u hashes.txt -d dictionary.dic -r out.rep - Dictionary Attack
sqlbf -u hashes.txt -c default.cm -r out.rep - Brute-Force Attack
> SQL Dict ( http://ntsecurity.nu/toolbox/sqldict/ )
> SQLAT ( http://www.cqure.net/wp/?page_id=6 )
> Hydra ( http://freeworld.thc.org/ )
> SQLlhf ( http://www.sqlsecurity.com/Tools/FreeTools/tabid/65/Default.aspx )
> ForceSQL ( http://www.securityfocus.com/tools/3021 )


Submitted On: 2019-05-29 17:14:32