8

Hacking Databases

The database is the crown jewel of most corporations, holding the greatest potential for privacy violation. In order to profit as much as possible from an assault, hackers seek out databases. All of the organization’s data is contained in some form of a database. The purpose of databases, after all, is to insert, retrieve, and present data. It can be easy to escalate privileges to a level where database data can be stolen and can even be infected with malicious content if a hacker can access the database. This might be accomplished through the use of SQL injections or by breaking into another machine inside the firewall and gaining access to the company.

Database hacking can mostly be broken down into database software vulnerabilities ...

Get Hands-On Ethical Hacking Tactics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.