Chapter 3. Hacking Database Services
Solutions in this chapter:
In this chapter, we will examine the most common database service vulnerabilities, and we will discuss methods to identify and exploit them using tools from the BackTrack Linux live distribution. Case studies will offer the reader a comprehensive approach to using the tools and techniques presented in this chapter. The knowledge gained from the case studies can be directly applied to a real-world penetration test.
After reading this chapter, the reader will have the knowledge necessary to:
Understand common database service vulnerabilities