top of page
Database hacking is among the most important arts of the hacker. Usually, the hacker is seeking access to data and obviously, the database is usually where it resides. This makes the database the "Golden Fleece" of the hacker.
Most often, databases are hacked using SQL injection and as such, this section will focus on SQL Injection (SQLi) techniques and tools.
Start by reading these article on databases.
1. Database Hacking, Part 1: Terms and Technologies before Getting Started
2. Database Hacking, Part 2: The Basics of SQL Injection and SQL Injection Tools
3. Database Hacking, Part 3: Using sqlmap for SQL Injection Against MySQL and WordPress
4. Database Hacking, Part 4: Extracting the Data from the Online Database
bottom of page