Do you ever hear about a database hack and think “Wow, whoever pulled this off must be some super-smart hacker type with access to advanced technology and supercomputers?” Well in reality nothing could be further from the truth. Database hacks are accomplished with a combination of readily available tools, a dash of readily available know-how, a large helping of blind luck, and a heaping helping of laziness on the part of the folks who are responsible for securing their systems.
In this presentation I will teach you how to hack a database so you can defend your systems against the hackers who want to get at your assets. We’ll cover these possible vectors:
- SQL Injection
- Google Dorks
- Stealing Entire Databases
- Gaining Physical Access
- Malware Attacks
- Network Sniffers
- Social Engineering
Leave a Reply