Welcome back, my fledgling hackers!
The database is the hacker’s “pot-of-gold,” as it contains information that is very valuable to both the business and the hacker. In this, the second of my series on hacking [...]
Welcome back, my hacker novitiates!
There are many ways to hack databases, and most of these techniques require SQL injection (SQLi), which is a way of sending SQL commands back to the database from a web form or other input. In [...]
Welcome back, my hacker apprentices!
Although there is a multitude of different hacker types, the one target they all share is the database. I often refer to the database as the hacker’s Holy Grail, or the ultimate prize for [...]
Welcome back, my rookie hackers!
A short while back, I began a new series on database hacking, and now it’s time to continue and extend your education in that field. As you know, the database contains all of the most [...]