Chapter 3. Hacking Database Services
Solutions in this chapter:
Introduction
In this chapter, we will examine the most common database service vulnerabilities, and we will discuss methods to identify and exploit them using tools from the BackTrack Linux live distribution. Case studies will offer the reader a comprehensive approach to using the tools and techniques presented in this chapter. The knowledge gained from the case studies can be directly applied to a real-world penetration test.
Objectives
After reading this chapter, the reader will have the knowledge necessary to:
Understand common database service vulnerabilities
Discover ...
Get Penetration Tester's Open Source Toolkit, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.