Stealth Procedure Injection
Attack
In this attack mode, a booby-trapped procedure slips into the primary database.

With SQL Replication
The hidden backdoor spreads everywhere.

With RMF's Object Synchronization
Application APIs expose no DDL, so the procedure can’t propagate.

Last updated