Vulnerability & Exploit Database

Back to search

Microsoft SQL Server Database Link Crawling Command Execution

This module can be used to crawl MS SQL Server database links and deploy Metasploit payloads through links configured with sysadmin privileges using a valid SQL Server Login. If you are attempting to obtain multiple reverse shells using this module we recommend setting the "DisablePayloadHandler" advanced option to "true", and setting up a exploit/multi/handler to run in the background as a job to support multiple incoming shells. If you are interested in deploying payloads to specific servers this module also supports that functionality via the "DEPLOYLIST" option. Currently, the module is capable of delivering payloads to both 32bit and 64bit Windows systems via powershell memory injection methods based on Matthew Graeber's work. As a result, the target server must have powershell installed. By default, all of the crawl information is saved to a CSV formatted log file and MSF loot so that the tool can also be used for auditing without deploying payloads.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name



  • Antti Rantasaari <antti.rantasaari [at]>
  • Scott Sutherland "nullbind" <scott.sutherland [at]>



  • Automatic


  • windows


  • x86
  • x64



Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/mssql/mssql_linkcrawler msf exploit(mssql_linkcrawler) > show targets ...targets... msf exploit(mssql_linkcrawler) > set TARGET <target-id> msf exploit(mssql_linkcrawler) > show options and set options... msf exploit(mssql_linkcrawler) > exploit