diff --git a/pentesting/pentesting-mssql-microsoft-sql-server.md b/pentesting/pentesting-mssql-microsoft-sql-server.md index 0a3cf627..b75a3d97 100644 --- a/pentesting/pentesting-mssql-microsoft-sql-server.md +++ b/pentesting/pentesting-mssql-microsoft-sql-server.md @@ -204,3 +204,7 @@ sp_addsrvrolemember 'hacker', 'sysadmin' The user running MSSQL server will have enabled the privilege token **SeImpersonatePrivilege.** You probably will be able to escalate to Administrator using this token: [Juicy-potato](https://github.com/ohpe/juicy-potato) +## Shodan + +* `port:1433 !HTTP` +