⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 sqllecture.html

📁 黑客培训教程
💻 HTML
📖 第 1 页 / 共 3 页
字号:
<BR>&lt;SpiderMan> UnHaFox: uh...depends on what it is

<BR>&lt;UnHaFox> can i ask?

<BR>&lt;AZTEK> well d4jinx isn't here for perl :(

<BR>&lt;Mikkkeee> well reptile said he was late but shit lets do my section

and then do one or two of his lectures

<BR>&lt;UnHaFox> its not a stupid one

<BR>&lt;reptile> juz ask UnHaFox

<BR>&lt;pixel_chomp> did anyone log this ?

<BR>&lt;Mikkkeee> i got the log

<BR>&lt;freakOVER[away]> i did

<BR>&lt;freakOVER[away]> i got the logs

<BR>&lt;freakOVER[away]> i'll send'em to u

<BR>&lt;freakOVER[away]> :P

<BR>&lt;_ciR_> k

<BR>&lt;AZTEK> this will be one huge ass log

<BR>&lt;Mikkkeee> okay i'll cut up the log

<BR>&lt;AZTEK> and i will probably end up converting it

<BR>&lt;Mikkkeee> shit 3 lectures

<BR>&lt;Mikkkeee> lol

<BR>&lt;SpiderMan> hahah

<BR>&lt;freakOVER[away]> yea

<BR>&lt;SpiderMan> there is so much more to cover

<BR>&lt;freakOVER[away]> we'll have to divide it

<BR>&lt;Mikkkeee> i'll spend the weekend doing that

<BR>&lt;freakOVER[away]> :P

<BR>*** AZTEK sets mode: +m

<BR>&lt;Mikkkeee> lol

<BR>&lt;AZTEK> yea spidys right

<BR>&lt;SpiderMan> UnHaFox never got to ask his question

<BR>*** SpiderMan sets mode: -m

<BR>&lt;AZTEK> we barely scratched the surface

<BR>&lt;SpiderMan> ask quickly

<BR>&lt;UnHaFox> ok, how can i change the version reply of mirc? successfully

changed one of the version replies, but not the first one..... (where it

say micr 5.81) or soemthing like that?

<BR>&lt;UnHaFox> thx

<BR>&lt;SpiderMan> heh with my I just hex it

<BR>&lt;reptile> UnHaFox:wait for the mirc scriptin lecture

<BR>&lt;reptile> :)

<BR>&lt;mezzano> off topic! ;)

<BR>&lt;Mikkkeee> what version reply? read the irc war tutorial

<BR>&lt;UnHaFox> ok

<BR>&lt;UnHaFox> sorry

<BR>&lt;Mikkkeee> i covered that section

<BR>&lt;Mikkkeee> okay let me do my section then reptile can do his lecture

<BR>&lt;reptile> *maybe* ill cover hexing the mirc client

<BR>&lt;Mikkkeee> which are you doing reptile?

<BR>&lt;SpiderMan> heh

<BR>&lt;Mikkkeee> heh

<BR>&lt;SpiderMan> guys for more info on php+sql go to www.php.net

<BR>&lt;SpiderMan> and look at their docs

<BR>&lt;UnHaFox> ok only use a hex editor, and find this entry, ok thx

guys

<BR>&lt;Mikkkeee> lol

<BR>&lt;reptile> Mikkkeee:vb,vb advanced,vb super advanced,api and shit,mirc

scriptin,*maybe* haxoring the mirc ckuebt

<BR>&lt;SpiderMan> UnHaFox: for an example version me

<BR>&lt;Mikkkeee> okay lets do the cracking sql section

<BR>&lt;freakOVER[away]> lol

<BR>&lt;reptile> *client

<BR>*** Mikkkeee sets mode: +m

<BR>*** Mikkkeee sets mode: +v reptile

<BR>&lt;Mikkkeee> okay iam going to talk a bit about breaking into ms sql

servers for versions 6.5 and 7.0

<BR>&lt;reptile> tankies

<BR>&lt;Mikkkeee> via tcp/ip on port 1433.

<BR>&lt;Mikkkeee> many ms sql servers run on port 1433,

<BR>&lt;Mikkkeee>&nbsp; if they are not configured to run on another tcp

port. Many scanners can

<BR>&lt;Mikkkeee> tell you the running sevice on the open port

<BR>&lt;Mikkkeee> and what service is running

<BR>&lt;Mikkkeee> ie- Retina from eEye and whatever you use.

<BR>&lt;Mikkkeee> so now

<BR>&lt;Mikkkeee> lets begin with the brute force attack

<BR>&lt;Mikkkeee> - many or most databases have some default and well known

passwords.

<BR>&lt;Mikkkeee>&nbsp; usually the system admin accounts can not be changed

in many of the commercial databases,

<BR>&lt;Mikkkeee> so thats a good thing for us. "sys" for ORACLE and "sa"

for SQL server cannot be changed.

<BR>*** Azido has quit IRC (Ping timeout: 180 seconds)

<BR>&lt;Mikkkeee> There is no password lockout that is avaiable for sql

server.

<BR>&lt;Mikkkeee> one fault that is quite amusing is that sql sever doesn't

not require a strong password.

<BR>&lt;Mikkkeee> While we know this for a fact its is very trivial and

at the same time eazy to use&nbsp; brute force attacks against the database

<BR>&lt;Mikkkeee> server with nothing standing in our way that can prevent

us from trying to break it to the highest lvl.

<BR>&lt;Mikkkeee> -okay let me name one good brute forcer.

<BR>&lt;Mikkkeee> goto packetstorm and search for sqlbf

<BR>&lt;Mikkkeee> if there are any better ones then try those.

<BR>&lt;Mikkkeee> Lets say you have cracked into the database, well once

your in the game begins.

<BR>&lt;Mikkkeee> lets start with system compromise by using extended procedure,

for v6.5

<BR>&lt;Mikkkeee> Many systems have very powerful feature

<BR>&lt;Mikkkeee> s

<BR>&lt;Mikkkeee> convieniet to DATABASES

<BR>&lt;Mikkkeee> but are going to be our backdoors into the database server

host.

<BR>&lt;Mikkkeee> =usually many databases because of lazy admins have no

password,

<BR>&lt;Mikkkeee> this case the "sa" account, usually the admin is a lazy

bum and has not put a password.

<BR>*** pixel_chomp has quit IRC (Quit: type /quit newbie status to become

an op)

<BR>&lt;Mikkkeee> -so now anyway once we get the password our aim moves

to takeing over the os, which usually is an nt box.

<BR>&lt;AZTEK> hi-ho hi-ho its off to code i go

<BR>*** AZTEK is now known as AZTEK[coding]

<BR>&lt;Mikkkeee> hehe

<BR>&lt;Mikkkeee> -by logging in as "sa" the attacker has the use of the

extended stored procedure which is "xp_cmdshell",

<BR>&lt;Mikkkeee> this will allows an sql server user or attacker to run

an dos cammand as if he is that person running the cammand at the console.

<BR>&lt;Mikkkeee> one thing the attacker can do

<BR>&lt;Mikkkeee> is add a&nbsp; user into windows nt account

<BR>&lt;Mikkkeee> and then can do it to the admin group.

<BR>*** Artist has joined #bsrf

<BR>&lt;Mikkkeee> to do this

<BR>&lt;Mikkkeee> they would type

<BR>&lt;Mikkkeee> :

<BR>&lt;Mikkkeee> Xp_cmdshell'net user hacker 678re0 /ADD'

<BR>&lt;Mikkkeee> now the attacker

<BR>*** Shadow_Stalker has quit IRC (Quit: May the force be with you :-))

<BR>&lt;Mikkkeee> just added a user hacker with the password 678re0

<BR>&lt;Mikkkeee> hehe nice password.

<BR>&lt;reptile> how cool

<BR>&lt;reptile> wouldnt this be cracking?

<BR>&lt;Mikkkeee> now lets add it to the administrators group.

<BR>&lt;Mikkkeee> there in

<BR>&lt;Mikkkeee> already they are backdooring the box

<BR>&lt;Mikkkeee> they would type:

<BR>&lt;Mikkkeee> Xp_cmdshell 'net localgroup /ADD Administrators hacker;

<BR>&lt;Mikkkeee> haha now hacker has become an NT administrator,

<BR>&lt;Mikkkeee> the reason this has worked is because the commnads are

being sumbitted to the os using the nt account under which the sql server

is being run,

<BR>&lt;Mikkkeee> this is local system account

<BR>&lt;Mikkkeee> which is the most powerful local account on the nt box.

<BR>&lt;Mikkkeee> -Another very good attack is to compromise the nt box

by reading the sam._ file

<BR>&lt;Mikkkeee> under the winnt/repair/sam._&nbsp; and

<BR>&lt;Mikkkeee> cracking the hashed password using the cracking tool

<BR>&lt;Mikkkeee> l0phtCrack

<BR>&lt;Mikkkeee> that tool is a work of art

<BR>&lt;Mikkkeee> Lets do this then,

<BR>&lt;Mikkkeee> we will need to use the exteded stored procedurer,

<BR>&lt;Mikkkeee> xp_regread which is from the registry.

<BR>&lt;Mikkkeee> so what are we waiting for lets get that little sam file.

<BR>&lt;Mikkkeee> xp_regread'HKEY_LOCAL_MACHINE;,'SECURITY\SAM\DOMAINS\ACCOUNT'.'F

<BR>&lt;Mikkkeee> we were going to read the passord out of the registry

<BR>&lt;Mikkkeee> so now if your a lazy attacker

<BR>&lt;Mikkkeee> you might want to use a canned tool, ahh let me name

a good one, goto

<BR>&lt;Mikkkeee> packetstrom and d/l SQLPOKE.

<BR>&lt;Mikkkeee> now lets talk about other procedures

<BR>&lt;Mikkkeee> -attacking the database/ gaining the password local compromise.

<BR>&lt;Mikkkeee> well the sa password is stored in clear text

<BR>&lt;Mikkkeee> so if you got local access goto

<BR>&lt;Mikkkeee> HKEY_CURRENT_USER\SOFTWARE\MICROSHIT\ oops

<BR>&lt;Mikkkeee> lol

<BR>&lt;Mikkkeee> HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\MSSQLServe\SQLEW\REGISTERED

SERVER\SQL 6.5

<BR>&lt;reptile> mikkkeee is there a way to determine if a server is runnin

SQL?

<BR>*** elite has quit IRC (Quit: )

<BR>&lt;Mikkkeee> above i talked about the scanner from&nbsp; eEye

<BR>&lt;reptile> retina?

<BR>&lt;Mikkkeee> yup

<BR>&lt;reptile> that costs $30k dude

<BR>*** Lone[Star] has joined #bsrf

<BR>&lt;reptile> ;(

<BR>&lt;Mikkkeee> haha pay

<BR>&lt;Mikkkeee> lol

<BR>&lt;Mikkkeee> the VER might be different well thats the path and the

password is stored as clear txt so you shouldn't have a hard time to obtain

it.

<BR>&lt;Mikkkeee> - another attack if the system is not secured usually

its not.

<BR>&lt;Mikkkeee> one method is to scan the host for smb ports (tcp 139,

udp, 137 and 138)

<BR>&lt;Mikkkeee> nt uses them for smb ports to communicate.

<BR>&lt;reptile> tankies

<BR>&lt;Mikkkeee> these should be closed by a firewall but you can belucky.

<BR>&lt;reptile> im off to writing a simple scanner for this

<BR>&lt;Mikkkeee> to attack the nt box using this attack you can chk out

rhino9

<BR>&lt;reptile> ;)

<BR>&lt;Mikkkeee> tutorial called "THE WINDOWS NT WARDOC, A STUDY IN REMOTE

PENETRATION"/

<BR>*** d3molisher has joined #bsrf

<BR>&lt;Mikkkeee> i belive we got an nt tutorial at the tuts page in blacksun

<BR>&lt;Mikkkeee> -well now you know that both usernames/passwords and

<BR>&lt;reptile> Another good hole in very bad nt machines is the front

page vti thing

<BR>&lt;Mikkkeee> data is usually sent unencrypted so that means you guessed

it can be sniffeed.

<BR>*** Devil_Panther has quit IRC (Quit: LOL = Lamers On-Line (&reg;&copy;,

and all the other lame legal shit))

<BR>&lt;Mikkkeee> nice /quit msg

<BR>&lt;Mikkkeee> yah the chances are slim

<BR>&lt;Mikkkeee> like finding phf vul pages

<BR>&lt;Mikkkeee> but you never know

<BR>&lt;Mikkkeee> Another method is keyloggers,

<BR>&lt;Mikkkeee> god blessssss the loggers

<BR>&lt;angel> hi Mikkkeee:)))

<BR>&lt;Mikkkeee> get a good one from www.keyloggers.com

<BR>&lt;Mikkkeee> hey angel

<BR>&lt;angel> whats up?

<BR>&lt;Mikkkeee> the best one against nt is called i think stealth keyloger

its the best&nbsp; well the sharewares ones kick ass. get those.

<BR>&lt;Mikkkeee> usually the shareware ones are called legit loggers so

i don't think AV scanners pick up those

<BR>&lt;Mikkkeee> but they might

<BR>&lt;Mikkkeee> .

<BR>*** BaGeL has quit IRC (Quit: Twenty-two points, plus triple word score,

plus 50 points for using all my letters. Game's over, I'm outta here. -Kwyjibo)

<BR>&lt;Mikkkeee> now let me talk a little about securing and we can goto

the other lecture

<BR>&lt;Mikkkeee> well one thing you can do to protect your self if your

running a dbs is to \:

<BR>&lt;Mikkkeee> 1-click the encyption option,

<BR>&lt;Mikkkeee> that isn't done by default so you got to do that in order

to encytp it so that could make snifferes useless,

<BR>&lt;Mikkkeee> 2- make sure your got a good firewall setup this is good

for the smb ports and against the portscanners.

<BR>&lt;Mikkkeee> 3-multi protocol

<BR>&lt;Mikkkeee> will let you use random tcp ports by default or you can

use fixed ports to ease firewall rulz.

<BR>*** _acid519- has quit IRC (Ping timeout: 180 seconds)

<BR>&lt;Mikkkeee> 4-if you can try to use muti protocol and enable encryption

<BR>&lt;Mikkkeee> if not then try to use ip sockest,

<BR>&lt;Mikkkeee> change the default ports and install some good firewall.

<BR>*** Artist has quit IRC (Quit: Leaving)

<BR>&lt;SpiderMan> Checkpoint Firewall-1 is a good choice

<BR>&lt;Mikkkeee> 5-Use a&nbsp; COM component or a webserver,

<BR>&lt;Mikkkeee> as the business obj layer.

<BR>&lt;Mikkkeee> okay done

<BR>&lt;Mikkkeee> any questions

<BR>*** Mikkkeee sets mode: -m

<BR>&lt;suspect> *clap *clap *clap *clap *clap *clap *clap *clap

<BR>&lt;S7> nope

<BR>&lt;Mikkkeee> if none reptile which are you going to do next?

<BR>&lt;freakOVER[away]> VB!

<BR>&lt;freakOVER[away]> :)

<BR>*** freakOVER[away] is now known as freakOVER

<BR>&lt;SySt3mShk> bv

<BR>&lt;SySt3mShk> vb

<BR>&lt;reptile> w00t

<BR>&lt;SpiderMan> aw, AZTEK and I didn't get a nice thing like that

<BR>&lt;TCL> nooooo! not VB!

<BR>&lt;reptile> now

<BR>&lt;freakOVER> :)

<BR>&lt;reptile> what do u ppl wanna start with vb/mirc scripting?

<BR>&lt;Mikkkeee> so if no questions this is the end of the sql lecture

<BR>&lt;reptile> *clap *clap *clap *clap *clap *clap *clap *clap

<BR>&lt;Mikkkeee> --------------------END OF LECTURE----------------

</BODY>

</HTML>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -