Главная
Study mode:
on
1
Introduction
2
SQL Server Community
3
Brian Kelley
4
The Weak Link
5
Phishing
6
spear phishing
7
attack strategy
8
what can you do
9
least privilege
10
auditing
11
extended events
12
selective neglect
13
motivation
14
extract files
15
sabotage
16
lateral movement
17
compromise
18
how to keep you out
19
nonproduction
20
solution
21
SQL Injection
Description:
Explore the mindset of a motivated adversary targeting SQL Server in this conference talk from PASS Data Community Summit. Delve into traditional and non-traditional weak points, discovery methods, exploitation techniques, and cover-up strategies. Learn about compensating for unfixable weaknesses through detection and response, and understand how attackers might counter these measures. Gain insights into attack strategies like phishing, spear phishing, and SQL injection. Discover the importance of least privilege, auditing, extended events, and selective neglect in defending against attacks. Understand attacker motivations, including data extraction, sabotage, lateral movement, and system compromise. Acquire practical knowledge on securing both production and non-production environments to keep adversaries at bay.

How I Would Attack SQL Server

PASS Data Community Summit
Add to list
0:00 / 0:00