SQL Post-Exploitation - Database Driven Attack Methodology presented at SOURCEDublin 2013

by Rob Whitey Beck,

Summary : "This talk covers attack methodologies that harness the Microsoft SQL Server platform as the basis for attack. This talk assumes a post-exploitation scenario, where the attacker already has administrative access inside of the database environment. New tools, utilities, and techniques will be presented as part of this lecture. Nearly all of the concepts presented as part of this lecture are not currently being employed by a vast majority of the professional pen-testers today.
Rob currently works for Casaba Security LLC out of Seattle, Washington. He specializes in attack and penetration methodologies, security research, and general mayhem. He enjoys nerding out, highly caffeinated beverages, and loathes people who don't observe the Oxford comma."