Targeting Support Systems
This chapter examines support systems, specifically database servers and network shares. These systems often provide backend access to sensitive data within and allow a professional penetration tester to circumvent other access controls, such as those found in Web interfaces. We will explore different techniques to attack these support systems that will allow us to obtain unauthorized access.
■ Database Attacks
■ Network Shares
This chapter delves deeper into a couple of different topics we briefly touched on back when discussing Chapter 8, and ...