Friday

How to Hack a Database

Warning: The purpose of article is to develop programs to prevent the hackers from hacking databases. This article lists the common methods used to hack databases.




Steps

Use wireless access points. Amateur hacking technique called "wardriving," which uses wireless access points to find vulnerable networks from which to launch attacks.

Use SQL injection. Once connected to those private networks, Hackers uses a well-known technique called "SQL injection" to trick Web applications into forking over private information that gave him deeper access into networks. Even though it sounds complicated, techies liken this kind of hack to simply turning the front doorknob to get into a house.
  • In the seven-layer Open System Interconnection model, a popular reference guide for securing a network software stack, the application layer is at the top. SQL injection is a Web-based attack that happens on this surface level. Securing the application layer is entry-level security stuff.
  • Hackers use either a Web application scanner or Web application firewall to guard against SQL injections. A Web application scanner likely would have likely caught the SQL injection vulnerabilities . If it didn't, an application firewall probably would have isolated the attacker from gaining access to other parts of the compromised networks.


Warnings

  • Only do this in your databases.

No comments:

Post a Comment