Cross Forest Enumeration
Our stored procedure makes dbuser a sysadmin. Now, let’s execute the stored procedure.
And let’s see the privileges of the database process:
Working as a cyber security solutions architect, Alisa focuses on bug bounty and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.