Chapter 6. Exploiting the Operating System
Solutions in this chapter:
▪ Accessing the File System
▪ Executing Operating System Commands
▪ Consolidating Access
Summary
Solutions Fast Track
Frequently Asked Questions
Introduction
One of the things mentioned in the introduction to Chapter 1 was the concept of utilizing functionality within the database to access portions of the operating system. Most databases ship with a wealth of useful functionality for database programmers, including interfaces for interacting with the database, or for extending the database with user-defined functionality.
In some cases, such as for Microsoft SQL Server and Oracle, this functionality has provided a rich hunting ground for security researchers looking for bugs in these ...
Get SQL Injection Attacks and Defense now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.