When talking about the weak sa password, we will first think that many databases have a similar super Administrator account, for example, Oracle is "system" and "sys ", sybase is also "sa", and MySQL contains "root" (not the root of the UNIX system account ). If the password is not set or the strength of the password is too low, the attacker can directly log on to and attack the database server, they can even obtain the highest level of permissions on your operating system. Speaking of this, some people may not believe it. Some people once told me: "How can the other party obtain the highest operating system permissions if the databases are the most attacked and your tables are taken away by others? "In fact, I am not alarmist. Below I assume that the SA password of a database of SQL Server 2000 is cracked, let's take a look at how hackers turn themselves into system administrators after obtaining database permissions.
At present, there are many such tools on the network, which can be used to facilitate those who are not familiar with SQL. In fact, there is no need to download such tools, as long as Microsoft's own SQL Server comes with client programs connected, you can easily turn yourself into the super administrator of the entire operating system. I will explain the specific process once. Here, we assume that hackers have used other tools to brute force crack the weak password of your sa account, or you have not set a password for the sa account. First, the hacker opens the SQL Server Query analyzer, logs in to your SQL Server database as sa and the brute-force password he just cracked, and then runs the following statement:
Xp_mongoshell "net user zxc nopassword/add" go xp_mongoshell "net localgroup/add administrators zxc" go
At this time, if you open your computer management ----- local users and group ----- users, then you will find that there is already a new account named zxc, and check the attributes of this account, you will find that he belongs to the administrators group.
Everyone must have understood this. Yes, hackers can easily turn themselves into super administrators on your Server by calling the xp_mongoshell stored procedure in the system database master of SQL Server, so what else can he do in the future.
Therefore, if you do not need to call this stored procedure at ordinary times, you can consider deleting it. Whether or not you need to call this stored procedure at ordinary times, you should set a very strong password for your sa account. This is the most fundamental and important. You can open the SQL Server Enterprise Manager and choose security> log on, right-click the sa account, select attributes, and modify the password of your sa account in the Properties dialog box. Here, we recommend that you make the settings as complex as possible, you can use English letters, numbers, and special symbols to prevent brute force cracking on this account. Of course, it is best to complete this operation when installing your SQL Server, to avoid potential security risks caused by human forgetting in the future.