Chapter 3. Hacking Database Services

Solutions in this chapter:

Introduction

In this chapter, we will examine the most common database service vulnerabilities, and we will discuss methods to identify and exploit them using tools from the BackTrack Linux live distribution. Case studies will offer the reader a comprehensive approach to using the tools and techniques presented in this chapter. The knowledge gained from the case studies can be directly applied to a real-world penetration test.

Objectives

After reading this chapter, the reader will have the knowledge necessary to:

  • Understand common database service vulnerabilities

  • Discover ...

Get Penetration Tester's Open Source Toolkit, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.