AWS Penetration Testing by Jonathan Helmus

AWS Penetration Testing by Jonathan Helmus

Author:Jonathan Helmus
Language: eng
Format: epub, mobi
Publisher: Packt Publishing Pvt. Ltd.
Published: 2020-11-05T00:00:00+00:00


Figure 5.19 – Displaying our new database

Now that we have made a database, we understand quite a bit more about RDS, MySQL, and how we can move about databases. Now let's discuss some common misconfigurations and perform a hands-on brute-forcing exercise to get a real view of the issues stemming from misconfigurations.

Understanding misconfigurations

Misconfigurations can be the end of a database if not corrected quickly and effectively. More often than not, these issues arise from poor hygiene or a lack of knowledge on the part of administrators. The holes left in databases are treasure troves for nasty hackers, and lots of fun for pentesters, however, just because they are fun for pentesters does not mean that they should be there!

Let's take a look at a few common issues that you may or may not find in your technology career.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.