Skip to Main Content
Penetration Tester's Open Source Toolkit, 3rd Edition
book

Penetration Tester's Open Source Toolkit, 3rd Edition

by Jeremy Faircloth
August 2011
Intermediate to advanced content levelIntermediate to advanced
464 pages
12h 57m
English
Syngress
Content preview from Penetration Tester's Open Source Toolkit, 3rd Edition
Chapter 5. Hacking database services
Information in this chapter:
• Objective
• Core Technologies
• Microsoft SQL Server
• Oracle Database Management System
• Case Study: The Tools in Action
• Hands-On Challenge
Databases store and provide access to information. Therefore, databases containing sensitive data such as bank account numbers, credit card numbers, Social Security numbers, credit reports, and, of course, national secrets, must be secure. The goal of a database penetration tester is to access the information within a database and use it to penetrate additional systems. With this in mind, this chapter examines database technologies and terminology, explains what occurs during database installation, and covers tools and techniques for exploiting ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Penetration Tester's Open Source Toolkit, 2nd Edition

Penetration Tester's Open Source Toolkit, 2nd Edition

Chris Hurley, Jeremy Faircloth

Publisher Resources

ISBN: 9781597496278