Post Exploitation
Finding Sensitive Info
Indicators of sensitive info are the size, utilization of transparent encryption, names etc.
For example, we can use this PowerUpSQL query to identify sensitive info based on names:
Or with transparent encryption:
Extracting hashes
PowerUpSQL has a very useful function called GetSQLServerPasswordHash that automates the extracting hashes.
Todo
Getting code execution via xpcmdshell and sp_OACreate
Last updated