This cheat sheet is built for the Red Teamers and Penetration Testers. It is designed such that the beginners can understand the fundamentals and the professionals can brush up their skills with the advanced options. There are multiple ways to perform all the mentioned tasks, thereby we've performed and compiled this list over with our experience. Please share it with your connections and send your queries and feedback directly to Hacking Articles.
- MSSQL for Pentester: Stored Procedures Persistence
- MSSQL for Pentester: Abusing Linked Database
- MSSQL for Pentester: Abusing Trustworthy
- MSSQL for Pentester: Command Execution with External Scripts
- MSSQL for Pentester: Impersonate
- MSSQL for Pentester: Metasploit
- MSSQL for Pentester: Command Execution with CLR Assembly
- MSSQL for Pentester: Command Execution with Ole Automation
- MSSQL for Pentester: Discovery
- MSSQL for Pentester: Command Execution with xp_cmdshell
- MSSQL for Pentester: Nmap
- MSSQL for Pentester: Hashing
- Command Execution with Extended Stored Procedures
- MSSQL for Pentester: Extracting Juicy Information
- MSSQL Lab Setup