Skip to Content
The Art of Network Penetration Testing
book

The Art of Network Penetration Testing

by Royce Davis
December 2020
Intermediate to advanced
304 pages
8h 57m
English
Manning Publications
Content preview from The Art of Network Penetration Testing

6 Attacking vulnerable database services

This chapter covers

  • Controlling MSSQL Server using mssql-cli
  • Enabling the xp_cmdshell stored procedure
  • Copying Windows registry hive files using reg.exe
  • Creating an anonymous network share
  • Extracting Windows account password hashes using Creddump

If you’ve made it this far on an internal network penetration test (INTP), then you’re probably feeling pretty successful, and you should be—you’ve already managed to compromise a few hosts. In fact, the few hosts you’ve gained access to thus far may be all you need to elevate your access to the level of owning the entire network. Remember, though, that the purpose of phase 2, focused penetration, is to compromise as many level-one hosts as you can.

Definition ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Penetration Testing

Penetration Testing

Georgia Weidman
Penetration Testing: A Survival Guide

Penetration Testing: A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran

Publisher Resources

ISBN: 9781617296826Supplemental ContentPublisher SupportOtherPublisher WebsiteSupplemental ContentPurchase Link