Troubleshooting MySQL Unable to Connect:invalid packet: scramble_length(0) !=length of scramble(21)

  Рет қаралды 145

ONTI Security

ONTI Security

Күн бұрын

I previously covered this section but realised that my old solution ran into issues again. In this video I redo the troubleshooting with a better and more efficient solution. I will be using nmap to achieve this,particularly nmap scripts. I will cover where the nmap scripts are stored and how they can be used against the target host
Time stamps
00:40- 01:50 recap on title of video
02:00 - 04:26 nmap scripts
04:30 nmap scanning with scripts
If you are encountering any problem still, please let me know in the comments. We can surely solve it if we work together.

Пікірлер: 5
@mrchism7897
@mrchism7897 3 ай бұрын
Thanks for this. I finally got the the point of getting login info for mysql but have not yet tried the brute force. I have a question about that. I sometimes attack multiple ip's at once, so do I need to follow this procedure for all ip's used or do I have to attack one at a time? Great work, and thank you for this. Michael
@mrchism7897
@mrchism7897 3 ай бұрын
Am I to assume that this method is a replacement for Metasploit brute force attack? I followed the steps successfully and I see the results but back in Metasploit ii is the same as it ever was.
@ONTISecurity
@ONTISecurity 3 ай бұрын
Micheal, thanks for engaging. Means a lot. For now I have opted for this as a replacement for Metasploit because it clearly is more consistent than Metasploit. I however, cannot say with absolute certainty that this method the definite replacemnent. It was just for this scenario and for future bruteforcing incase Metasploit fails again. So this is essentially a backup. As far as brute forcing multiple IPs, I suppose you could try insterting the IP addresses in a sequence (one IP followed by another, no comma, just a space between the addresses) in the host arguments. I have not attempted to do this yet because the need has not arisen and also because I was only working with one IP at that point in time.I also assumed it would take a LOT of time. A lot more time than just opening up a few terminals and designating each terminal for each IP. I hope that helps.
@mrchism7897
@mrchism7897 3 ай бұрын
@@ONTISecurity Have you compiled a list of Meatasploit auxiliaries or modules that do work as intended?
@ONTISecurity
@ONTISecurity 3 ай бұрын
​@@mrchism7897 No I haven't. Not yet at least. I mentioned you could open tabs individually but I also forgot to mention that you could use a range of IPs you're looking to target. An example would look like this nmap -sS -T4 -script=all -p 3306 192.168.0/24 This would be much more efficient than scanning target IPs individually.Don't know why I forgot to mention this.
Hacking Port 111  Metasploitable 2.
22:06
ONTI Security
Рет қаралды 197
My Daughter's Dumplings Are Filled With Coins #funny #cute #comedy
00:18
Funny daughter's daily life
Рет қаралды 23 МЛН
Help Me Celebrate! 😍🙏
00:35
Alan Chikin Chow
Рет қаралды 74 МЛН
Which One Is The Best - From Small To Giant #katebrush #shorts
00:17
Microservices with Databases can be challenging...
20:52
Software Developer Diaries
Рет қаралды 57 М.
Normalization - 1NF, 2NF, 3NF and 4NF
19:02
channel5567
Рет қаралды 2,2 МЛН
Microsoft Exchange Server 5.5 - Email like its 1998
24:06
RetroSpector78
Рет қаралды 154 М.
Postgres just got even faster
26:42
Hussein Nasser
Рет қаралды 34 М.
Hacking Metasploitable 2 port 23 :Telnet
17:27
ONTI Security
Рет қаралды 35
Solving one of PostgreSQL's biggest weaknesses.
17:12
Dreams of Code
Рет қаралды 198 М.
My Daughter's Dumplings Are Filled With Coins #funny #cute #comedy
00:18
Funny daughter's daily life
Рет қаралды 23 МЛН