SQL Server SA Permissions Summary (or steal on auxiliary Blog)

xiaoxiao2021-03-06  103

When you need to use these things recently, I find that I have a bit not clear, this is really nothing. No way, I have to summarize it on my own blog. The process of using the SQLEXEC plus administrator here is not involved. Prerequisites: SQL Query Analyzer and SQLEXEC SUNX VERSION: About XP_CMDSHELL to protect the system's analysis summary: First, know the statement: 1. Removing the XP_cmdshell extension process is to use the following statement:

Code: if exists (select * from dbo.sysobjects where id = object_id (N '. [Dbo] [xpcmdshell]') and OBJECTPROPERTY (id, N'IsExtendedProc ') = 1) exec sp_dropextendedproc N' [dbo] [xp_cmdshell. ] '2. The way to add the XP_cmdshell extension process is to use the following statement:

Code: sp_addextendedProc xp_cmdshell, @ dllname = 'xplog70.dll' now look at the phenomenon: We have executed the CMD command with SQLEXEC after obtaining SA permissions, and prompt SQL_ERROR, then it is likely to remove XP_cmdshell. Now let's take a look at two ways to recover after the XP_cmdshell: Method 1. Use SQL Query Analyzer to connect directly to the other party directly, it is very convenient

Code: sp_addextendedProc xp_cmdshell, @ dllname = 'xplog70.dll' method, using SQLEXEC SUNX VERSION first in the Format option of SQLEXEC Sunx Version, enter the% s in the CMD option

Code: sp_addextendedProc 'xp_cmdshell', 'XPSQL70.DLL' or uses SQL2000

Code: sp_addextendedProc 'xp_cmdshell', 'XPLog70.dll' additionally uses SQLEXEC Sunx Version to remove XP_cmdshell method, when selecting conditions, then enter

Code: sp_dropextendedProc 'xp_cmdshell' can be part of the second part: If the other party has removed XPLog70.dll or changed, we will continue our HACK task with the following method: When there is a phenomenon, it is impossible to be XPLOG70. DLL deletes or changed. Write in the query analyzer

Code: sp_addextendedProc xp_cmdshell, @ DLLNAME = 'xplog70.dll' prompts that there is an object that has already named 'xp_cmdshell' in the database so how do we recover? In fact, in accordance with the method provided by the master LCX, we can implement it in writing scripts in the query analyzer. For specific script source code, please click the connection.

转载请注明原文地址:https://www.9cbs.com/read-97669.html

New Post(0)