UNC Path Injection
Overview
This attack takes advantage of the xp_dirtree procefure to force an SQL server to connect to a SMB share that the attacker controls, allow the attacker to capture the Net-NTLM hash of the SQL account to be cracked offline or relayed.
Examples
xp_dirtree
The following SQL query can be used:
xp_subdirs
The following SQL query can be used:
xp_fileexist
The following SQL query can be used:
Capturing\Relaying the Net-NTLM
Using responder to capture the Net-NTLM hash
Relaying the Net-NTLM hash
SMB signing needs to be disabled to perform this attack.
Last updated