From: Sels, Roger (roger.sels@gov-fbi.net)
Date: Fri Feb 25 2005 - 03:36:36 EST
> Hi ALL,
>
> Doing a pentest on a site hosting a vulnerable verion of MySQL on a
> Windows box. I was able to get full access to the DB and export ALL the
> data. Anyone have any ideas on jumping to the Windows OS with full
> access to Just the DB.
>
> Thanks
>
Hi Anthony,
If the MySQL server is vulnerable, you could try using stored procedures &
extended stored procedures (XP) such as xp_cmdshell , which will allow you
to execute code.
XP's are written in high-languages like C and compiled into .DLL's. The
advantage is that the DLL just needs to be present on the machine to be
able to exploit it, much like the .dll's needed to exploit some ISAPI IIS
extensions ;)
e.g. SQL XP: exec master..xp_cmdshell 'dir' would obtain a directory
listing of the current working directory of the SQL Server process.
Check out the most excellent paper "Advanced SQL Injection techniques" by
Chris Anley. (http://www.nextgenss.com/papers/advanced_sql_injection.pdf )
Viewable as HTML if you use google, but I guess that's obvious ;)
Good luck!
Roger
-- Under capitalism, man exploits man. Under communism, it's just the opposite. J.K.Galbraith
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:17 EDT