Anatomy of an attack: Gaining Reverse Shell from SQL injection

SQL injection opens a lot of possibilities for an attacker like dumping the database, causing denial of service, or stealing sensitive information. But it becomes more interesting when it can be used to compromise a server. Different SQL databases, like MSSQL, MySQL, ORACLE, PLSQL pose different sets of challenges for the attacker once the injection … Continue reading Anatomy of an attack: Gaining Reverse Shell from SQL injection