Anatomy of a Database Attack

Cover Image
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows… databases are vulnerable to a myriad of threats and attack vectors.

Imperva CTO Amichai Shulman will use live demonstrations to trace the steps involved in breaking into a database, and present a reference architecture and checklist for implementing iron-clad database security measures. Specific topics covered during this webinar include:

  • The 5 Steps for Attacking a Database
  • Key tools for obtaining database credentials such as Brute Force and Exhaustive Search
  • Primary database attack methods such as Lateral SQL Injection and Buffer Overflow
  • Covert tactics used by database attackers to cover their tracks and avoid detection
Vendor:
Imperva
Premiered:
Nov 12, 2009
Format:
Multimedia
Type:
Webcast
Already a Bitpipe member? Log in here

Download this Webcast!