Tuesday, January 24, 2012

How do hackers infiltrate and steal information from databases?

I'm doing a project and need to describe databases as an IT system, and the methods hackers use to steal information from these databases (preferably financial record databases).

However, if you could, please provide links to some websites with info on the topic. Thanks.How do hackers infiltrate and steal information from databases?One method described here used hijacked 'session cookie' to sign in from a remote computer %26amp; steal money. Other techniques are sprinkled throughout the Krebs website.

http://krebsonsecurity.com/2010/04/compu…



Another method is an "SQL injection" where a certain keystroke combination, placed into a 'user defined' slot (like a login screen, or similar) grants access (to the hacker) to the targets web files, as administrator. Changes can then be made of any kind whatsoever.

Google "SQL injection" for further reading.How do hackers infiltrate and steal information from databases?find the target IP address, scan ports, send various emails and content to test the infrastructure and see how it responds, force your way on an internal machine with things like telnet or ssh and run exploits.

No comments:

Post a Comment