Skip to content

Microsoft SQL(mssql) - Detect

ID: mssql-detect

Severity: info

Author: Ice3man543,tarunKoyalwar

Tags: js,mssql,detect,network

id: mssql-detect
info:
name: Microsoft SQL(mssql) - Detect
author: Ice3man543,tarunKoyalwar
severity: info
metadata:
max-request: 1
shodan-query: port:1433
tags: js,mssql,detect,network
javascript:
- code: |
var m = require("nuclei/mssql");
var c = m.MSSQLClient();
c.IsMssql(Host, Port);
args:
Host: "{{Host}}"
Port: "1433"
matchers:
- type: dsl
dsl:
- "response == true"
- "success == true"
condition: and
# digest: 490a00463044022016a7b290890e98abaf81699658a24b7ac92d251b822b270f2883d724d0429913022006603e02686d1d24527a8a2f070c470c67388b21ecd85ea8f826eaee232f4760:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "javascript/detection/mssql-detect.yaml"

View on Github