Database Vulnerabilities

One of the most attractive targets for any attacker is a database that contains information about a site, application, or organization. Databases represent the “holy grail” to attackers because of the information within them: configuration information, application data, and other data of all shapes and sizes. An attacker who can locate a vulnerable database will find it a very tempting target to pursue—and may very well do so.

Databases lie at the heart of nearly every web application. In fact, most web applications could not function without a database as their back end. Web applications are essentially web-based front ends or access points for the valuable data stored in databases. Attackers routinely look at web applications ...

Get Ethical Hacking: Techniques, Tools, and Countermeasures, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.