nullbyte.png

DB Hacking

Article cover image
Oct 16, 2015

Welcome back, my hacker novitiates!There are many ways to hack databases, and most of these techniques require SQL injection (SQLi), which is a way of sending SQL commands back to the database from a ...

Article cover image
Jan 28, 2014

Welcome back, my greenhorn hackers!In a previous tutorial on hacking databases, I showed you how to find online databases and then how to enumerate the databases, tables, and columns. In this guide, w ...

Article cover image
Jan 12, 2014

Welcome back, my amateur hackers!In this tutorial, we will follow up on a previous tutorial on MySQL. In that tutorial, I showed you the basics of running a MySQL server on BackTrack. In addition, you ...

Article cover image
Dec 3, 2013

Welcome back, my rookie hackers!A short while back, I began a new series on database hacking, and now it's time to continue and extend your education in that field. As you know, the database contains ...

Article cover image
Oct 15, 2013

Welcome back, my fledgling hackers!The database is the hacker's "pot-of-gold," as it contains information that is very valuable to both the business and the hacker. In this, the second of my series on ...

Article cover image
Sep 30, 2013

Welcome back, my hacker apprentices!Although there is a multitude of different hacker types, the one target they all share is the database. I often refer to the database as the hacker's Holy Grail, or ...