


The information we are interested in from the connection string will be: A connection string contains information to explain to the application how to connect to the database. The first task is to find the connection string being used by the web application. An instance contains one or more databases.All instances are identified by a unique name.An SQL server contains one or more “instances”.A Primer on SQL Serverīefore reading on, it’s important to be aware of the following points: If IIS is configured with a high privilege account, it’s possible to turn a basic LFI into a full breach of the database. What about when the web server is the only service and there is no practical use of those hashes?Ī service frequently coupled with ASP.NET powered websites is Microsoft SQL Server. When exploiting local file inclusion vulnerabilities on a host that does not adhere to The Principle of Least Privilege, a common file to target is the SAM file in order to crack the NTLM hashes or to attempt Pass The Hash attacks.
