Database exploitation
After covering a startup of SCADA exploitation, let's move further onto testing database services. In this section, our primary goal will be to test databases and check the backend for various vulnerabilities. Databases, as you might know, contain almost everything that is required to set up a business. Therefore, if there are vulnerabilities in the database, it might lead to important company data being leaked. Data related to financial transactions, medical records, criminal records, products, sales, marketing, and so on, could be very useful to buyers of these databases.
To make sure databases are fully secure, we need to develop methodologies for testing these services against various types of attacks. Let's now start ...
Get Mastering Metasploit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.