Metasploit mailing list archives
Re: MSSQL enum module
From: Nicolas Braud-Santoni <nicolas.braudsantoni () gmail com>
Date: Fri, 26 Aug 2011 19:13:17 +0200
John, If you are concerned about Metasploit corrupting/modifying the DB, you can create an user who doesn't have INSERT/DROP/... privileges. Hoping that helps Nicolas PS : It could be nice of you to write your questions in correct English, since it would make it easier for us non-native speakers. Le Fri, 26 Aug 2011 11:04:57 -0500, Tod Beardsley <todb () planb-security net> a écrit :
Almost all of the commands in mssql_enum are simple select statements, with the one exception of the: "sp_config 'show advanced option', '1'; reconfigure" statement, which is a common and unobtrusive command to list config options. So, looks good to me. I would be fine running this in production. On Fri, Aug 26, 2011 at 3:03 AM, John Mistikopoulos <mailtest1223133456 () gmail com> wrote:Helllo. The module mssql_enum is intrusive, I mean its execution can harm the database? Thnx, John _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- MSSQL enum module John Mistikopoulos (Aug 26)
- Re: MSSQL enum module Tod Beardsley (Aug 26)
- Re: MSSQL enum module Nicolas Braud-Santoni (Aug 26)
- Re: MSSQL enum module Tod Beardsley (Aug 26)