Главная
Study mode:
on
1
Intro
2
Agenda
3
No Sequel Databases
4
Why NoSQL
5
NoSQL Snapshot
6
NoSQL Key Points
7
MongoDB
8
Architecture
9
JavaScript
10
Mapping
11
Demo
12
Database Object in Mongo
13
JavaScript Techniques
14
JavaScript Injection Attacks
15
Saving JavaScript
16
Load JavaScript Function
17
Associative Array
18
Resource Exceptional MongoDB
19
CouchDB
20
CouchDB Architecture
21
CouchDB Attacks
22
Admin Parties
23
Cross Side Port Attack
24
Enumeration Attack
25
PHP on Couch
26
Query
27
All Docs
28
Redis
29
Redis Key Features
30
Attacks
31
Lua Scripting
32
Key Points
33
Script Kill
34
Denial of Service Attack
35
Rename Command
36
Rewrite Command
37
Enumeration
38
Security Issues
39
Source Command
40
Java
41
NoSQL
42
NoSQL Framework
43
Key Features
44
Database Cloning
45
Future Updates
Description:
Explore pentesting techniques for NoSQL databases in this 36-minute conference talk from 44CON Information Security Conference. Delve into the security implications of NoSQL adoption, focusing on MongoDB, CouchDB, and Redis. Learn about injection attacks, JavaScript exploitation, and automated testing using the NoSQL Exploitation Framework. Discover architectural vulnerabilities, attack vectors, and security issues specific to each database type. Gain insights into database cloning, enumeration attacks, and denial of service techniques. Understand the importance of securing NoSQL implementations and stay updated on emerging threats in this rapidly evolving field.

Pentesting NoSQL DB's Using NoSQL Exploitation Framework

44CON Information Security Conference
Add to list
0:00 / 0:00