-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Hacking For Dummies - Sixth Edition
By :
Chapter 16
IN THIS CHAPTER
Testing and exploiting database flaws
Finding storage weaknesses
Ferreting out sensitive information
Countering database and storage abuse
Attacks against databases and storage systems can be very serious, because that’s where “the goods” are located, and those with ill intent are well aware of that fact. These attacks can occur across the Internet or on the internal network when external attackers and malicious insiders exploit any number of vulnerabilities. These attacks can also occur via the web application through SQL injection. This chapter covers some common vulnerabilities that, when exploited, can be very impactful to the business.
Database systems — such as Microsoft SQL Server, MySQL, and Oracle —...
Change the font size
Change margin width
Change background colour