January 2017
Beginner to intermediate
1045 pages
22h 24m
English
NoSQL databases are being widely used these days. Enterprises are widely adapting NoSQL databases such as MongoDB, CouchDB, and so on. These databases have support for mobile applications, too. Similar to any other local storage technique, data when stored using NoSQL databases in an insecure manner is possible to exploit. This section walks through the concepts of how improper usage of NoSQL databases can cause insecure data storage vulnerabilities.
Let's look into this vulnerability using a sample application.
Knowing the functionality of the application is very important to understand the risk it has and enables us to find the risk of the app.
Let's look at a sample application ...