Chapter 16

Databases and Storage Systems

IN THIS CHAPTER

Bullet Testing and exploiting database flaws

Bullet Finding storage weaknesses

Bullet Ferreting out sensitive information

Bullet Countering database and storage abuse

Attacks against databases and storage systems can be very serious because that’s where “the goods” are located, and those with ill intent are well aware of that fact. These attacks can occur across the Internet or on the internal network when external attackers and malicious insiders exploit any number of vulnerabilities. These attacks can also occur via the web application through SQL injection. This chapter covers some common vulnerabilities that, when exploited, can be very impactful to a business.

Diving Into Databases

Database systems such as Microsoft SQL Server, MySQL, and Oracle have lurked behind the scenes, but their value and vulnerabilities have finally come to the forefront. Yes, even the mighty Oracle, which was once claimed to be unhackable, is as susceptible to exploits as its competition. With the slew of regulatory requirements governing database security, hardly any ...

Get Hacking For Dummies, 7th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.