For database administrators, security typically means assigning appropriate rights to logins, ensuring that passwords do not easily succumb to a brute-force attack, and helping developers write code free of SQL injection vulnerabilities. After we take care of these fundamentals, it's time to look at the next layer of attacks: network-based attacks. This presentation will focus on two particular network attacks: abusing SQL authentication and taking advantage of a man-in-the-middle attack. We will close with discussion on how to mitigate these attacks.
Click here to access the slides for this presentation.
The slides are licensed under Creative Commons Attribution-ShareAlike.
Click here to access demo code for this presentation.
The source code is licensed under the terms offered by the GPL.