Users login

Create an account »


Users login

Home » Information Security Videos » Owning Windows Domain through MSSQL reverse shell

Owning Windows Domain through MSSQL reverse shell

August 07, 2013 Demonstrating reverse shell attack on MSSQL

Here's a demonstration of "pass-the-hash" attack which covers reverse shell upload to MSSQL server, privilege escalation from the Network service to Local admin using the vulnerable autostart script, escalation from Local Admin to the System User, stealing the token of the Domain Admin and adding a new Windows Domain Admin user.

Video source: YouTube

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »