Advertisment

Threat profiling MS SQL Server

author-image
CIOL Bureau
Updated On
New Update
Format : PDF
Type : Whitepaper
Length : 21 Page(s)
Language : English
Click here to download the paper
An attacker's location in the application space and/or the network will largely define how they would approach breaking into a SQL Server 2000 machine from a remote location.

If their attacks go through SQL Injection via a web server then their 'cursus incursi' will be considerably different from those when direct access can be gained to the SQL Server.

tech-news