SQL Security Revisited

SQL Security Revisited

Black Hat via YouTube Direct link

Section 2 Conclusion

26 of 32

26 of 32

Section 2 Conclusion

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

SQL Security Revisited

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Presentation Outline
  3. 3 Presence
  4. 4 Security Framework
  5. 5 Net Libraries
  6. 6 SQL Server Service Context
  7. 7 SQL Server Security Modes (cont.)
  8. 8 Good Idea - What's the problem? • Microsoft recommends Windows Authentication Mode
  9. 9 Mode Guidelines
  10. 10 SQL Server Roles
  11. 11 C2 Level Auditing
  12. 12 Some Other SQL 2K Goodies
  13. 13 The Bad
  14. 14 Target Acquisition
  15. 15 Newsgroups
  16. 16 SQL Scanning
  17. 17 Broadcast Discovery
  18. 18 SQL Server Discovery
  19. 19 SQL Ping Utility
  20. 20 Account Acquisition (cont.)
  21. 21 Source Code Disclosure
  22. 22 Privilege Escalation (cont.)
  23. 23 Other Potential Pitfalls
  24. 24 They're in - Now What?
  25. 25 Your Defenses
  26. 26 Section 2 Conclusion
  27. 27 The Ugly
  28. 28 Scope of SQL Injection
  29. 29 SQL Injection Example 2
  30. 30 Live Demonstration
  31. 31 SQL Injection Samples
  32. 32 SQL Injection - Tricks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.