Get the Whitepaper called The Operation CloudBurst Attack. It discusses exploitation methodologies in relation to databases.
You can download it from the following link: https://packetstormsecurity.com/files/download/86463/cwh_operation.txt
Source: https://packetstormsecurity.com/files/86463/Whitepaper-Called-The-Operation-CloudBurst-Attack.html

