Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Ridter/PySQLTools
Mssql利用工具
https://github.com/Ridter/PySQLTools
Last synced: 3 months ago
JSON representation
Mssql利用工具
- Host: GitHub
- URL: https://github.com/Ridter/PySQLTools
- Owner: Ridter
- Created: 2022-11-21T03:44:33.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2023-08-07T05:03:37.000Z (about 1 year ago)
- Last Synced: 2024-06-06T20:02:30.666Z (5 months ago)
- Language: Python
- Size: 396 KB
- Stars: 257
- Watchers: 4
- Forks: 33
- Open Issues: 0
-
Metadata Files:
- Readme: README.MD
Awesome Lists containing this project
- awesome-hacking-lists - Ridter/PySQLTools - Mssql利用工具 (Python)
README
# PySQLTools
[SharpSQLTools](https://github.com/uknowsec/SharpSQLTools) Python版本,方便在没windows机器或代理场景下使用。
>对于Link相关操作没做相关测试。有问题可以提Issue。
## 使用
支持Windows及密码认证 😊Windows认证方式为:
```
python PySQLTools.py localhost/administrator:'password'@10.211.55.251 -windows-auth -debug
```账号密码认证方式为:
```
python PySQLTools.py sa:'password'@10.211.55.251
```如果碰到以下错误:
```
[-] [('SSL routines', '', 'unsafe legacy renegotiation disabled')]
```可添加OPENSSL配置文件来加载,如:
```
OPENSSL_CONF=openssl.conf python PySQLTools.py sa:'password'@10.211.55.251
```支持功能如下:
```
enable_xp_cmdshell - you know what it means
disable_xp_cmdshell - you know what it means
xp_cmdshell {cmd} - executes cmd using xp_cmdshell
sp_oacreate {cmd} - executes cmd using sp_oacreate
xp_dirtree {path} - executes xp_dirtree on the path
sp_start_job {cmd} - executes cmd using the sql server agent (blind)
enable_ole - you know what it means
disable_ole - you know what it means
upload {local} {remote} - upload a local file to a remote path (OLE required)
download {remote} {local} - download a remote file to a local path (OLE required)
enable_clr - you know what it means
disable_clr - you know what it means
install_clr - create assembly and procedure
uninstall_clr - drop clr
clr_pwd - print current directory by clr
clr_ls {directory} - list files by clr
clr_cd {directory} - change directory by clr
clr_ps - list process by clr
clr_netstat - netstat by clr
clr_ping {host} - ping by clr
clr_cat {file} - view file contents by clr
clr_rm {file} - delete file by clr
clr_exec {cmd} - for example: clr_exec whoami;clr_exec -p c:.exe;clr_exec -p c:\cmd.exe -a /c whoami
clr_efspotato {cmd} - exec by EfsPotato like clr_exec
clr_badpotato {cmd} - exec by BadPotato like clr_exec
clr_godpotato {cmd} - exec by GodPotato like clr_exec
clr_combine {remotefile} - When the upload module cannot call CMD to perform copy to merge files
clr_dumplsass {path} - dumplsass by clr
clr_rdp - check RDP port and Enable RDP
clr_getav - get anti-virus software on this machin by clr
clr_adduser {user} {pass} - add user by clr
clr_download {url} {path} - download file from url by clr
clr_scloader {shellcode} - shellcode.bin
clr_assembly {prog} {args} - execute-assembly.
clr_assembly_sc {shellcode} - assembly shellcode created by donut.
use_link {link} - linked server to use (set use_link localhost to go back to local or use_link .. to get back one step)
enum_db - enum databases
enum_links - enum linked servers
enum_impersonate - check logins that can be impersonate
enum_logins - enum login users
enum_users - enum current db users
enum_owner - enum db owner
exec_as_user {user} - impersonate with execute as user
exec_as_login {login} - impersonate with execute as login
! {cmd} - executes a local shell cmd
show_query - show query
mask_query - mask query
```## 更新
2023/07/27添加了执行assembly的功能,通过加载shellcode的方式实现,在linux上可完美运行:
![](assets/20230727172738.png)
在其他平台上,需要使用docker的[donut](https://github.com/TheWover/donut)生成shellcode,在使用`clr_assembly_sc`进行加载执行。
## CLR
CLR源码见:[MSSQL_CLR](https://github.com/Ridter/MSSQL_CLR)
## 参考:```
1、https://github.com/uknowsec/SharpSQLTools
2、https://github.com/ShutdownRepo/impacket/blob/getST/examples/mssqlclient.py
```