Chapter 3. Hacking Database Services

Solutions in this chapter:

Introduction

In this chapter, we will examine the most common database service vulnerabilities, and we will discuss methods to identify and exploit them using tools from the BackTrack Linux live distribution. Case studies will offer the reader a comprehensive approach to using the tools and techniques presented in this chapter. The knowledge gained from the case studies can be directly applied to a real-world penetration test.

Objectives

After reading this chapter, the reader will have the knowledge necessary to:

  • Understand common database service vulnerabilities

  • Discover ...

Get Penetration Tester's Open Source Toolkit, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.