Beyond SQL Injection

WARNING!

This presentation is now obsolete. The information in this talk has not been updated in a while and could be outdated. Use the information in this presentation at your own risk and be sure to double-check things to ensure that any information you use is accurate.

ABSTRACT

For database administrators, security typically means assigning appropriate rights to logins, ensuring that passwords do not easily succumb to a brute-force attack, and helping developers write code free of SQL injection vulnerabilities. After we take care of these fundamentals, it's time to look at the next layer of attacks: network-based attacks. This presentation will focus on two particular network attacks: abusing SQL authentication and taking advantage of a man-in-the-middle attack. We will close with discussion on how to mitigate these attacks.

ADDITIONAL MEDIA

No recordings or additional media are available for this talk.