
上QQ阅读APP看书,第一时间看更新
Using the mssql_ping module
The very first auxiliary module that we will be using is mssql_ping. This module will gather service information related to the MSSQL server.
So, let us load the module and start the scanning process as follows:

We can clearly see that mssql_ping has generated an excellent output of the fingerprinted MSSQL service.