Attacking SQL databases
Now as we have learned about the database protocols and their operations, let’s focus on the misconfiguration of the MSSQL database, which attackers use to compromise not only the MSSQL database but also the complete database-hosted server, leading to even domain controllers. So, let’s quickly start with a penetration testing approach.
Enumeration of SQL servers in a domain
Enumeration is defined as the intelligence gathering of information about a target or targets. Enumeration is also defined as information gathering, which is very important in the early stages, as it will provide the exact information about vulnerabilities or misconfigurations to exploit the SQL database server. So, let’s start with information gathering.
Enumeration of the SQL servers is done usually via three methods:
- TCP/User Datagram Protocol (UDP) port scanning
- Local instance enumeration scan
- Domain enumeration scan
So, let’...