azure_arc_servers_jumpstart/artifacts/testDefenderForSQL.ps1 (26 lines of code) (raw):

# Execute sql commands to generate defender for cloud alerts param ( [string]$workingDir = "C:\ArcBox" ) Write-Host "Executing Defender for SQL threat simulation script." Write-Host "Current working directory: $pwd" $moduleFile = $workingDir + "\SqlAdvancedThreatProtectionShell.psm1" if ($true -ne [System.IO.File]::Exists($moduleFile)) { Write-Host "Module file $moduleFile not installed. Try running script mannually later. Search for PowerShell module file 'SqlAdvancedThreatProtectionShell.psm1' in one of the '$Env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\Resources\' sub folders to re-run this test script." Exit } # Verify if modules are installed. If not wait until it is available Import-Module $moduleFile Get-Command -Module SqlAdvancedThreatProtectionShell Write-Host "Executing SQL injection" $saPasswordEncrypted = ConvertTo-SecureString -String "JS123!!" -AsPlainText -Force Test-SqlAtpInjection -UserName sa -Password $saPasswordEncrypted # High risk Start-Sleep(30) # Wait between tests # Run brute force test to generate alerts Write-Host "Executing brute force attack" Test-SqlAtpBruteForce # High risk Start-Sleep(30) # Wait between tests # Run shell obfuscation test Write-Host "Executing SQL shell obfuscation" Test-SqlATpShellObfuscation -UserName sa -Password $saPasswordEncrypted # Medium risk