O'Reilly logo

Seven Deadliest Microsoft Attacks by Naomi Alpern, Mike Borkin, Brian Barber, Rob Kraus

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How Stored Procedure Attacks Work

As you would hope from a security perspective, stored procedures are not always available for attackers to use right out of the box. For example, SQL Server may not have stored procedures available for you to utilize (an administrator may have removed them or they may be disabled by default), and it does require you to have appropriate permissions when accessing these procedures. Certain conditions, therefore, may need to exist before initiating an attack utilizing SQL's stored procedures.

Initiating Access

The first step in the attack methodology is to obtain access to accounts or applications with proper permissions to interact with the stored procedures. A common SQL Server account that is fruitful for ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required