Vulnerabilities in Back-End Systems and Structured Query Language (SQL) Databases

Back-end systems are also subject to risk if not properly secured. Because the back-end databases of a web application solution typically do not offer the same variety of services that a front-end system does, planned attacks may be easier. The strategy for attempting to compromise back-end systems is relatively the same, though. The intention is to gain access to data, either through compromising a database or escalating a privilege level.

Develop an Attack Plan

Developing an attack plan for a back-end system or database is very similar to developing one for a web front-end system. Many attack methods can be performed through the same web application or forms. ...

Get Internet and Web Application Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.