Overview
Explore the critical vulnerabilities in SQL Server configurations through this informative conference talk from OWASP AppSec California 2015. Delve into 10 common weak setups that hackers exploit to gain unauthorized access to data, applications, and systems. Witness practical demonstrations of real-world attack techniques used in penetration testing. Gain valuable insights for developers, new database administrators, and aspiring penetration testers on the risks associated with inadequate SQL Server configurations. Learn from Scott Sutherland, a principal security consultant at NetSPI, as he shares his expertise in database security, penetration testing, and information security research.
Syllabus
10 Deadly Sins of SQL Server Configuration - Scott Sutherland - OWASP AppSec California 2015
Taught by
OWASP Foundation