Authentication bypass
Meta information gathering
Databases enumeration
Tables and columns enumeration
Data exfiltration
Database credentials extraction
Reading and writing files
System commands execution
Denial of Service
Out-of-band channeling
Logs management
Persistence
Last updated 4 years ago