During this on-demand session, STEALTHbits Technologies reviews how Microsoft SQL Server can be discovered, attacked, and used as a vehicle for attacking systems and data. By the end, you will have the information you need to become one of the exceptions to the rule and run Microsoft SQL in a safe and secure way.
In this webinar, we cover:
Discovery and initial exploit using nmap and medusa with reference to metasploit
Review of the kill chain in a box that makes up PowerUpSQL
Exploiting weak SQL configurations to won the system-level-using plain SQL