![]() ![]() ![]() ![]() Moreover, weak credentials of low secure databases can help to use credential reusability or brute-forcing credentials to compromise highly secured database. If the version of database is outdated, it can be easily attacked through finding a suitable exploit. There are different tricks and techniques to exploit each of them depending upon the information we get after reconnaissance.Įxploiting database is a key target for cyber criminals due to a valuable information storage and a number of loopholes including deployment failures, broken databases, data leak, stolen database backup, lack of segregation, SQL injections and database inconsistencies.Īny information related to database is advantageous to an attacker when it comes to generate an attack. Whether the information is about the version of database or the structure of database can render more juicy information to plan a strategy. It is an entity of independent networks containing telecommunication networks, databases, smart devices and web applications. Talking about target, Cyber world is not entirely an internet but a lot more than that. Without any prior knowledge of a victim and the weaknesses that can help to exploit the target, the attack could not be successfully generated. Cyber reconnaissance is the most significant phase to stimulate an attack. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |