An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application.

Cornerstone.IT