-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Network Protocols for Security Professionals
By :
Now as we have learned about the database protocols and their operations, let’s focus on the misconfiguration of the MSSQL database, which attackers use to compromise not only the MSSQL database but also the complete database-hosted server, leading to even domain controllers. So, let’s quickly start with a penetration testing approach.
Enumeration is defined as the intelligence gathering of information about a target or targets. Enumeration is also defined as information gathering, which is very important in the early stages, as it will provide the exact information about vulnerabilities or misconfigurations to exploit the SQL database server. So, let’s start with information gathering.
Enumeration of the SQL servers is done usually via three methods:
So, let’...
Change the font size
Change margin width
Change background colour