Home page logo
/

pen-test logo Penetration Testing mailing list archives

MS SQL Server
From: xyberpix <xyberpix () xyberpix com>
Date: Thu, 15 Sep 2005 19:26:06 +0100

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hey All,

Ok, so here's the deal, I've managed to compromise a Win2k server at a clients site, and this also has thier Peoplesoft and Remedy databases on it, running on MS SQL 2000. I have been able to successfully add myself to the local Administrators group, and can now TS into the box in question. I have absolutely no rights on the SQL server though, so any pointers here would be greatly appreciated! I found a backup of the Remedy db, and by setting up a SQL server on one of my machines managed to restore it, and I now have access to that, thatnks to a load of MS SQL howto's online, but I am more concerned about getting the Peoplesoft db data, but no such joy with finding backups lying around.

Ideally I would like to try and avoid commercial tools, but as far as compromising a SQL server, I've never done it before, and could do with any help that I can get here.
TIA

xyberpix
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Darwin)

iD8DBQFDKby+cRMkOnlkwMERAkYWAJ4tJoIfeLIOXZGhJtEw2W32NbUUIACgi+M7
eoDhb/94tyIzabflpx1sF3s=
=9eMX
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]