Offensive Security Tools DBPWAUDIT – DATABASE PASSWORD AUDITING TOOL

This Prefix Contains Tools That Are Used for Offensive Security Purposes, Such as Red Teaming, Penetration Testing, or Simulating Cyber Attacks.

CyberGod

Administrator
Staff member
Admin
Joined
Dec 23, 2021
Messages
724
Location
Hell
Website
hellofhackers.com
Hellcoins
♆25,965
Profile Music
DBPwAudit is a Java database password auditing tool that allows you to perform online audits of password quality for several database engines. The application design allows for easy adding of additional database drivers by simply copying new JDBC drivers to the jdbc directory.

DBPwAudit - Database Password Auditing Tool



Configuration is performed in two files, the aliases.conf file is used to map drivers to aliases and the rules.conf tells the application how to handle error messages from the scan.

Compatibility
The tool has been tested and known to work with:

– Microsoft SQL Server 2000/2005
– Oracle 8/9/10/11
– IBM DB2 Universal Database
– MySQL

Requirements
The tool is pre-configured for these drivers but does not ship with them, due to licensing issues. The links below can be used to find some of the drivers. They should all be copied to the jdbc directory.


Links to JDBC Drivers:

– MySQL
– Microsoft SQL Server 2005
– Microsoft SQL Server 2000
– Oracle

Usage



1
2
3
4
5
6
7
8
9
10
11
12
root@darknet:~# dbpwaudit
DBPwAudit v0.8 by Patrik Karlsson <[email protected]>
----------------------------------------------------
DBPwAudit -s <server> -d <db> -D <driver> -U <users> -P <passwords> [options]

-s - Server name or address.
-p - Port of database server/instance.
-d - Database/Instance name to audit.
-D - The alias of the driver to use (-L for aliases)
-U - File containing usernames to guess.
-P - File containing passwords to guess.
-L - List driver aliases.


Scan the SQL server (-s 192.168.1.130), using the specified database (-d testdb) and driver (-D MySQL) using the root username (-U root) and password dictionary (-P /usr/share/wordlists/nmap.lst):


1root@darknet:~# dbpwaudit -s 192.168.1.130 -d testdb -D MySQL -U root -P /usr/share/wordlists/nmap.lst


You can download DBPwAudit here:
You must reply before you can see the hidden data contained here.
 
Top