O'Reilly logo

Seven Deadliest Microsoft Attacks by Naomi Alpern, Mike Borkin, Brian Barber, Rob Kraus

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Dangers Associated with a Stored Procedure Attack

The question you may be thinking right now is, what is the point of using a stored procedure attack if you already require sysadmin-level privileges prior to executing it? This is a valid question because if you already have sysadmin-level privileges, then you have the ability to create and manage privileges within the database, the ability to manipulate any part of the databases stored within SQL, and access to all of the data. Therefore, the point of the attack cannot be to gain administrative privileges within the database itself. If you already have everything you need to walk in through the front door of a building, the question becomes, what do you get by using the service entrance?

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required