DAFT Commands
Generic Info
daft.exe -i <SQL SERVER> -d master -m query -q "select system_user;"
daft.exe -i <SQL SERVER> -d master -m query -q "SELECT LEFT(@@version, CHARINDEX(' - ', @@version)) ProductName;"
daft.exe -i <SQL SERVER> -d master -m query -q "SELECT IS_SRVROLEMEMBER('sysadmin');"
daft.exe -i <SQL SERVER> -d master -m query -q "SELECT IS_SRVROLEMEMBER('sysadmin');"List Databases and Owners
DAFT.exe -i <SQL SERVER> -d master -m Database | findstr "DatabaseName && DatabaseOwner"Checks for some Excessive Privileges, only found Database Ownership Chaining
DAFT.exe -i <SQL SERVER> -d master -m AuditPrivDbChainingBasic server information
DAFT.exe -i <SQL SERVER> -d master -m ServerInfoLists links
DAFT.exe -i <SQL SERVER> -d master -m ServerLinkLink crawling
DAFT.exe -i <SQL SERVER> -d master -m ServerLinkCrawlLists granted permissions
Lists sysadmins
Using specific DB Creds
Impersonation
Found this uncertain of output exactly
Change a users password
OLE Stored Procedure
XP cmd shell
COMMAND EXECUTION - LOCAL - XP COMMAND SHELL
UNC Injection
Capture NTLM Relay hash
Set up responder ad get NTML relay hash
crack it with hashcat
Relay hash for code execution
impacket ntlmrelay
DAFT Built in CMD Execution
Linked PrivEsc
Linked Servers XP cmd shell
Linked Servers xp cmd shell - openquery
Add Linkded Login
ALTER Role cmd
Enable RPC
Last updated
Was this helpful?