mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse. The client requires impacket and sysadmin privileges on the SQL server.
Please read this article carefully before continuing.
It consists of three parts:
To generate the core DLL, just import the project to Visual Studio (reciclador.sln) and compile it.
To generate the CLR assembly, first you need to find the C# compiler:
Get-ChildItem -Recurse "C:\Windows\Microsoft.NET\" -Filter "csc.exe" | Sort-Object fullname -Descending | Select-Object fullname -First 1 -ExpandProperty fullname
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /target:library .\assembly.cs
Once the two libraries are compiled, upload the core DLL (reciclador) to the target server.
Authentication options are the same as the ones in the original mssqlclient . mssqlproxy options:
proxy mode: -reciclador path [Remote](<https://www.kitploit.com/search/label/Remote> "Remote" ) path where DLL is stored in server -install Installs CLR assembly -uninstall Uninstalls CLR assembly -check Checks if CLR is ready -start Starts proxy -local-port port Local port to listen on -clr local_path Local CLR path -no-check-src-port Use this option when connection is not direct (e.g. proxy)
We have also implemented two commands (within the SQL shell) for downloading and uploading files. Relating to the proxy stuff, we have four commands:
-clrparam to read the generated CLR from a local DLL file.
-reciclador), which can be uploaded using the upload command.
-local-portis not specified, it will listen on port 1337/tcp. Once the proxy is started, you can plug in your proxychains ;)
-no-check-src-portflag is needed, so the server only checks the source address.
All the code included in this project is licensed under the terms of the MIT license. The mssqlclient.py is based on Impacket .