metasploit-framework/modules/auxiliary/scanner/mssql/mssql_ping.rb

40 lines
759 B
Ruby
Raw Normal View History

require 'msf/core'
module Msf
class Auxiliary::Scanner::Mssql::Mssql_ping < Msf::Auxiliary
include Exploit::Remote::MSSQL
include Auxiliary::Scanner
def initialize
super(
'Name' => 'MSSQL Ping Utility',
'Version' => '$Revision: 3624 $',
'Description' => 'This module simply queries the MSSQL instance for information.',
'Author' => 'MC',
'License' => MSF_LICENSE
)
deregister_options('RPORT', 'RHOST')
end
def run_host(ip)
begin
info = mssql_ping(2)
if (info['ServerName'])
print_status("SQL Server information for #{ip}:")
info.each_pair { |k,v|
print_status(" #{k + (" " * (15-k.length))} = #{v}")
}
end
rescue Errno::EACCES
end
end
end
end