0% found this document useful (0 votes)
53 views21 pages

Database Hacking: Prepared By: Hibba Tabeer

Databases can be hacked through SQL injection and by exploiting vulnerabilities. Attackers target databases because that is where most organizations store their important data. It is possible to hack a database if it is not properly secured. Some ways to protect databases from hacking include installing firewalls, updating software, following strong password policies, monitoring databases for anomalies, encrypting data, checking permissions, and using two-factor authentication. Regular security testing and patching vulnerabilities can also help strengthen database defenses.

Uploaded by

Hibba Tabeer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views21 pages

Database Hacking: Prepared By: Hibba Tabeer

Databases can be hacked through SQL injection and by exploiting vulnerabilities. Attackers target databases because that is where most organizations store their important data. It is possible to hack a database if it is not properly secured. Some ways to protect databases from hacking include installing firewalls, updating software, following strong password policies, monitoring databases for anomalies, encrypting data, checking permissions, and using two-factor authentication. Regular security testing and patching vulnerabilities can also help strengthen database defenses.

Uploaded by

Hibba Tabeer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Database Hacking

Prepared by:
Hibba Tabeer
Database:

• The word database is derived from two


words, data which means unanalyzed
information & Base which means
location.
• Database is a software in which a
collection of related and organized set
of information is placed.
Your grocery store

bank, restaurant

online shopping sites

Example Hospital

favorite clothing store

mobile service provider

for instance, all use databases to keep track of customer,


inventory, employee and accounting information.
Database
Management • A DBMS is a set of programs that are used to
create, maintain and manipulate database in a
System convenient way.

(DBMS):
Database hacking:

• The hacker is seeking access to data and obviously, the


database is usually where it resides. This makes the database
the "Golden Fleece" of the hacker.
• Most often, databases are hacked using SQL injection and as
such, this section will focus on SQL Injection (SQLi)
techniques and tools.
• Any regular database user can hack a
Is it possible to database if it's not properly monitored. No
hack database? matter if operating systems and networks
are properly secured, databases still could:
Can database be mis-configured, have weak passwords,
be vulnerable to unknown and known
be hacked? vulnerabilities, etc.
How databases are
hacked?
• Attackers can exploit buffer overflows,
SQL Injection, etc. in order to own the
database server. The attack could
be through a web application by
exploiting SQL Injection, so no
authentication is needed. In this way
databases can be hacked from Internet
and firewalls are complete bypassed.
SQL injection:

SQL injection is a code


injection technique
that might destroy
your database.

SQL injection is one of


the most common web
hacking techniques.
Protection • The internet today allows you to perform various tasks
with ease. On the other hand, you need to know how to
against protect your sensitive database from hacking problems.

Database • Here are some things you can follow to secure your
database from hacks.

Hacking:
•You should consider installing database firewalls that will
help restrict access to traffic by default. Make sure that
you receive traffic only from specified applications or
1. Install database webservers that access data. Not only that, you need to
protect your database from unauthorized outbound
firewalls and web connections with the firewall. 
•Moreover, you should install a web application firewall to
application protect your database from certain attacks. Some of them
firewall include SQL injection, file inclusion, cookie-poisoning that
provides ways to obtain optimal results. A web application
firewall allows you to monitor and filter the HTTP traffic. It
even paves ways to block any malicious attacks that aim to
exfiltrate data from your system.
2. Update your • You should update your operating systems and database
operating systems software as fast as you can with security patches. This
will help discover the most recent vulnerabilities that
and patches require more protection from hacking. It is wise for you
to test the patches on non-production servers first and
  detect any patch problems in your mailing lists.
  •You should create strong passwords that are easy to
  remember and hard to crack. Implement a good password
policy in your company that protects the data from
3. Follow a good hacking. If you are using websites for shopping or banking
purposes, then you should consider changing the
password policy passwords every couple of days. 
• You should monitor and audit the database continuously
that will help detect anomalous activity on your
operating systems. Furthermore, you can create alerts
for employees to notify them when identifying a
potential malicious attack. Effective monitoring allows
4. Monitor and you to detect the email accounts of your employees
when they indulge in suspicious activities.
audit database • Besides that, you can even detect the users when they
share the accounts after creating an email account
without your permission. You should consider installing
database activity monitoring software that can help get
the desired results.
• You should encrypt the data into an unreadable and
encoded format that will help get more protection from
5. Encrypt data hacking. Moreover, you should back up your encrypted
data that provides an extra security measure. You can
and backups create several encrypted backups which contribute
more to prevent data from hackers. Backing up your
system will help you get high protection from hacking
and other problems to a large extent.
6. Check your • Your system is vulnerable to attacks if your database
settings & configurations undergo some changes.
database settings Therefore, you should check them properly to detect
& configurations any sort of changes that will help protect your data from
hacks.
7. Use two- • Two-factor authentication is one of the best ways to
factor protect data from potential risks. It acts as an extra layer
of protection that gives ways to improve your online

authentication security. The process involves two steps that allow you
to control access to sensitive data.
8. Check your • You should check your database installations regularly to
database know the weak passwords and misconfigurations. If you
use third-party products to install database servers,

installations then you should monitor them to detect any suspicious


activities.
9. Check for • You should always check object & time permissions to
object & time monitor any errors that occur on your system.
Permission changes will always result in

permissions misconfigurations, and you should fix them as soon as


possible to prevent hacks.
10. Build • You can detect database attacks in your organization by

database server building a database server honeyspot to gain more


advantages. This, in turn, gives ways to prevent both

honeyspot internal and external attacks to get maximum protection


from attacks.
11. Use third- • If you have few database servers in your company, then
you can monitor them manually with some basic tools.

party tools On the other hand, you should consider using third-
party tools when you have more database servers in
your organization.
12. Test your • You should consider building a database security
infrastructure to prevent data from attackers when they
database want to steal it. However, it is important to test your
database security that will help find missed
security vulnerabilities on your system. You can hire third-party
services for this purpose to ensure high protection

You might also like