
Sign up to save your podcasts
Or
Attackers can exploit buffer overflows, SQL Injection, etc. in order to own the database server. The attack could be through a web application by exploiting SQL Injection so no authentication is needed. In this way databases can be hacked from Internet and firewalls are complete bypassed.
Featuring “keycybr” CI&R Intern “Anjana S”
Get in touch with her – https://www.linkedin.com/in/anjana-s-23509b1a6/
Attackers can exploit buffer overflows, SQL Injection, etc. in order to own the database server. The attack could be through a web application by exploiting SQL Injection so no authentication is needed. In this way databases can be hacked from Internet and firewalls are complete bypassed.
Featuring “keycybr” CI&R Intern “Anjana S”
Get in touch with her – https://www.linkedin.com/in/anjana-s-23509b1a6/