Post Fri May 09, 2008 3:35 am

Database attacks


I've just read this article on Dark reading regarding penetrating databases. Gave me food for thought and I'll be looking over my own sysems in response to make sure I haven't missed the obvious.

Is also a good example of ways to penetrate systems without requiring an exploit which was recently queried by Loic all methds mentioned rely on poor configuration, poor input validation or simple human error. No 'sploit required