Further reading
These aids for further study will let you dive deeper into the attacks covered in the chapter:
- SQL Server network ports: https://www.mssqltips.com/sqlservertip/7212/sql-server-port-explanation-usage/
- SQL Server 2022 new fixed server-level roles: https://learn.microsoft.com/en-us/sql/relational-databases/security/authentication-access/server-level-roles?view=sql-server-ver16
- Pre-SQL Server 2022 fixed server-level roles: https://www.mssqltips.com/sqlservertip/1887/understanding-sql-server-fixed-server-roles/
- SQLRecon tool: https://github.com/skahwah/SQLRecon
- PowerUpSQL tool: https://github.com/NetSPI/PowerUpSQL
- PowerUpSQL Cheat Sheet: https://github.com/NetSPI/PowerUpSQL/wiki/PowerUpSQL-Cheat-Sheet
- HeidiSQL tool: https://www.heidisql.com/
- MS SQL Server enumeration: https://book.hacktricks.xyz/network-services-pentesting/pentesting-mssql-microsoft-sql-server#common-enumeration
- MS SQL Server enumeration 2: https://ppn.snovvcrash.rocks...