0% found this document useful (0 votes)
219 views11 pages

DEFCON 21 Chow Abusing NoSQL Databases PDF

NoSQL Hacking. Defcon Conference Presentation. Defcon edition 21. SQL vs NOSQL . NO SQL injection

Uploaded by

Hamz_sajjad
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
219 views11 pages

DEFCON 21 Chow Abusing NoSQL Databases PDF

NoSQL Hacking. Defcon Conference Presentation. Defcon edition 21. SQL vs NOSQL . NO SQL injection

Uploaded by

Hamz_sajjad
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11
Abusing NoSQL Databases Ming Chow Email: [email protected] Twitter: @tufts_cs_mchow That was then: a few SQL database options for any application This is now: a plethora of database options, you have to choose the right database for the right job Many NoSQL databases are built for performance, scalability, and flexibility Security of NoSQL databases? Weak, inconsistent, the wild wild west | talked on abusing HTML5 back at DEF CON 19 Bryan Sullivan scratched the surface with his BlackHat 2011 work "Server-Side JavaScript Injection" The rise of client and server-side JavaScript There is a lot to just the database side of things

You might also like