Pentesting NoSQL DB's Using NoSQL Exploitation Framework

Pentesting NoSQL DB's Using NoSQL Exploitation Framework

44CON Information Security Conference via YouTube Direct link

JavaScript Techniques

13 of 45

13 of 45

JavaScript Techniques

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Pentesting NoSQL DB's Using NoSQL Exploitation Framework

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda
  3. 3 No Sequel Databases
  4. 4 Why NoSQL
  5. 5 NoSQL Snapshot
  6. 6 NoSQL Key Points
  7. 7 MongoDB
  8. 8 Architecture
  9. 9 JavaScript
  10. 10 Mapping
  11. 11 Demo
  12. 12 Database Object in Mongo
  13. 13 JavaScript Techniques
  14. 14 JavaScript Injection Attacks
  15. 15 Saving JavaScript
  16. 16 Load JavaScript Function
  17. 17 Associative Array
  18. 18 Resource Exceptional MongoDB
  19. 19 CouchDB
  20. 20 CouchDB Architecture
  21. 21 CouchDB Attacks
  22. 22 Admin Parties
  23. 23 Cross Side Port Attack
  24. 24 Enumeration Attack
  25. 25 PHP on Couch
  26. 26 Query
  27. 27 All Docs
  28. 28 Redis
  29. 29 Redis Key Features
  30. 30 Attacks
  31. 31 Lua Scripting
  32. 32 Key Points
  33. 33 Script Kill
  34. 34 Denial of Service Attack
  35. 35 Rename Command
  36. 36 Rewrite Command
  37. 37 Enumeration
  38. 38 Security Issues
  39. 39 Source Command
  40. 40 Java
  41. 41 NoSQL
  42. 42 NoSQL Framework
  43. 43 Key Features
  44. 44 Database Cloning
  45. 45 Future Updates

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.