Chapter 5. Hacking database services
Information in this chapter:
• Objective
• Core Technologies
• Microsoft SQL Server
• Oracle Database Management System
• Case Study: The Tools in Action
• Hands-On Challenge
Databases store and provide access to information. Therefore, databases containing sensitive data such as bank account numbers, credit card numbers, Social Security numbers, credit reports, and, of course, national secrets, must be secure. The goal of a database penetration tester is to access the information within a database and use it to penetrate additional systems. With this in mind, this chapter examines database technologies and terminology, explains what occurs during database installation, and covers tools and techniques for exploiting ...

Get Penetration Tester's Open Source Toolkit, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.