| ||
We hope this chapter has shown you the ropes of how to approach an attack against RDBMS software. The approach is similar to that taken with most other pieces of softwarewith one big difference. Hacking database servers could be compared to hacking a compilerthere is so much flexibility and enough programming space that it almost becomes easy. DBAs need to be aware of this weakness in database servers and lock down their servers appropriately. Hopefully, the Slammer worm will be one of the last, if not the last, worm able to take over database server software with such ease.
| ||