Event JSON
{
"id": "09209bccda8005a4ab9467b3bb224dc279bb56cbeaf859da38a6bdb11f26ee78",
"pubkey": "f5759699c92ae2addf1eac17701485903a7344f16e19fd77a2e374e4043969bd",
"created_at": 1728031596,
"kind": 1,
"tags": [
[
"zap",
"f5759699c92ae2addf1eac17701485903a7344f16e19fd77a2e374e4043969bd",
"wss://relay.mostr.pub",
"0.915"
],
[
"zap",
"6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9",
"wss://relay.mostr.pub",
"0.085"
],
[
"t",
"sql"
],
[
"proxy",
"https://fosstodon.org/users/governa/statuses/113248278685999404",
"activitypub"
]
],
"content": "#SQL Server credential objects can be abused to execute code as either a SQL server login, a local windows user or a domain user.\n\nhttps://www.netspi.com/blog/technical-blog/network-pentesting/hijacking-sql-server-credentials-with-agent-jobs-for-domain-privilege-escalation",
"sig": "3aafceaf7b2f6f1cdc9010cc35aa5807cbb977757ade657b8464cc1db6b7cb5f53e94c64435b684ede43eb52b0bedff710f65b56943a0b405350a358c4ae98c6"
}