Releases: n3rada/MSSQLand
Releases · n3rada/MSSQLand
v1.0.1
🛠 Fixed --
Argument Parsing Issue - #2
Now, --
is automatically filtered out during command parsing, ensuring than if someone use this - even if it is not needed - it will handle the case.
Example of incorrect usage
execute-assembly /home/kali/backpack/winaries/csharp/MSSQLand.exe -- /h:localhost /c:token /a:exec whoami
Correct usage (No -- needed)
execute-assembly /home/kali/backpack/winaries/csharp/MSSQLand.exe /h:localhost /c:token /a:exec whoami
📂 Commit Details
- 🔗 Fix implemented in commit: ff08f00
- 📌 Assembly Version Updated to: 1.0.1 (see AssemblyInfo.cs)
Full Changelog: v1.0.0...v1.0.1
The Only MS SQL Tool You’ll Ever Need 🚀
🎉 Release Highlights
Introducing MSSQLand v1.0, the ultimate tool for navigating Microsoft SQL Server environments. Whether you’re a penetration tester, security researcher, or T-SQL aficionado, MSSQLand is designed to make your work easier, more efficient, and polished. Built with professional penetration testers in mind, but easy enough for anyone to use.
With MSSQLand, you can:
- Traverse multi-hop linked servers, impersonating users across the chain.
- Interact with SQL environments, leveraging advanced query capabilities.
- Extract credentials using the ADSI provider to exploit misconfigured linked servers.
- Generate professional, Markdown-friendly output, perfect for reporting.
- Automate complex operations like enumerating permissions, linked servers, and users.
- Load CLR assemblies and execute remote PowerShell scripts, expanding your attack surface effortlessly.