initiating any inbound connections to your computer, and if so, consult your
server documentation to ensure it is correctly configured.
Leveraging the Operating System
It is often possible to perform escalation attacks via the database that result in
execution of arbitrary commands on the operating system of the database
server itself. In this situation, there are many more avenues available to you for
retrieval of data, such as using built-in commands like
tftp
,
mail
, and
telnet
,
or copying data into the web root for retrieval using a browser. See the later
section “Beyond SQL Injection” for techniques for escalating privileges on the
database itself.
Do'stlaringiz bilan baham: