Injected stored procedure / trigger

Avoid propagation of stealth procedures that you did not know were present

Attack Vector

In this attack mode, a booby-trapped procedure slips into the primary database.

SQL Restore Migration

The hidden backdoor spreads to the migrated site.

XPort Migration

Application APIs expose no DDL, so the procedure canโ€™t propagate.

Last updated