ποΈSQL Database Attacks
π― Overview
ποΈ SQL Attack Methodology
Attack Chain Overview
Service Discovery β Authentication Bypass β Database Enumeration β Data Extraction β Command Execution β Lateral MovementKey Attack Vectors
π Service Discovery & Analysis
Default Ports & Scanning
Banner Grabbing Example
Key Information to Extract
π Authentication Mechanisms & Bypass
1. MSSQL Authentication Types
Windows Authentication Mode
Mixed Mode Authentication
2. MySQL Authentication Methods
3. Historical Vulnerabilities
CVE-2012-2122 - MySQL Timing Attack
π Protocol Specific Attacks
1. Database Connection & Authentication
MySQL Connection
MSSQL Connection Methods
Windows Authentication
ποΈ Database Enumeration & Data Extraction
1. Default System Databases
MySQL System Schemas
MSSQL System Databases
2. Database Enumeration Commands
Show Databases
Select Database
Show Tables
Extract Table Data
π» Command Execution Techniques
1. MSSQL Command Execution
xp_cmdshell Usage
Enable xp_cmdshell
2. MySQL Command Execution
User Defined Functions (UDF)
π File Operations
1. Write Local Files
MySQL File Writing
MSSQL File Writing
2. Read Local Files
MSSQL File Reading
MySQL File Reading
π·οΈ Hash Stealing Attacks
1. MSSQL Service Hash Capture
Using xp_dirtree
Using xp_subdirs
2. Capture Setup
Responder Setup
Impacket SMB Server
π€ Privilege Escalation
1. User Impersonation
Identify Impersonatable Users
Check Current Privileges
Impersonate Higher Privileged User
π Lateral Movement
1. Linked Servers
Identify Linked Servers
Execute Commands on Linked Servers
π Skills Assessment Examples
Example 1: Service Hash Capture
Example 2: Database Enumeration
Example 3: Privilege Escalation
π‘οΈ Defense & Mitigation
Database Security Hardening
Detection Strategies
π Related Techniques
π References
π― HTB Academy Lab Scenarios
Scenario 1: Initial Database Access
Scenario 2: MSSQL Service Hash Capture
Terminal 1 - Start SMB Server
Terminal 2 - Execute Hash Stealing Attack
Captured Hash Output
Scenario 3: Flag Enumeration with Escalated Privileges
Connect with mssqlsvc Account
Database and Table Enumeration
Flag Extraction
π SQL Attack Checklist
Authentication Attacks
Database Exploitation
Post-Exploitation
π‘οΈ Defense & Detection
Security Hardening
Detection Strategies
π Related Techniques
Last updated