Access Through Access – A whitepaper that has aggregated various material regarding how to exploit Microsoft Access during a penetration test.
You can download it from the following link: https://packetstormsecurity.com/files/download/65967/Access-Through-Access.pdf
Source: https://packetstormsecurity.com/files/65967/Access-Through-Access.pdf.html

