MS Access is commonly thought of as the little brother of Database engines, and not a lot of material has
been published about methods used for exploiting it during a penetration test. The aim of this paper is to
bring a lot of disparate information together into one guide.