Kali Linux

  1. The Kali Linux Toolkit: Database Assessment
    1. Database Discovery and Enumeration
      1. Network-Based Discovery
        1. Port Scanning for Database Services
          1. Service Banner Analysis
            1. Default Port Identification
            2. Database Service Enumeration
              1. MySQL Enumeration
                1. PostgreSQL Enumeration
                  1. Microsoft SQL Server Enumeration
                    1. Oracle Database Enumeration
                      1. MongoDB Enumeration
                    2. SQL Injection Assessment
                      1. Automated SQL Injection Testing
                        1. SQLMap
                          1. Database Management System Detection
                            1. Injection Technique Selection
                              1. Data Extraction Methods
                                1. Advanced Exploitation Features
                                  1. Tamper Scripts
                                    1. Custom Payloads
                                  2. Manual SQL Injection Testing
                                    1. Union-Based Injection
                                      1. Boolean-Based Blind Injection
                                        1. Time-Based Blind Injection
                                          1. Error-Based Injection
                                            1. Second-Order Injection
                                          2. Database-Specific Assessment Tools
                                            1. MySQL Assessment
                                              1. mysql-audit
                                                1. MySQL Configuration Analysis
                                                  1. Privilege Escalation Testing
                                                  2. PostgreSQL Assessment
                                                    1. postgresql-audit
                                                      1. PostgreSQL Security Configuration
                                                      2. Oracle Database Assessment
                                                        1. oscanner
                                                          1. tnscmd10g
                                                            1. Oracle TNS Listener Testing
                                                              1. Oracle SID Discovery
                                                              2. Microsoft SQL Server Assessment
                                                                1. SQL Server Configuration Review
                                                                  1. xp_cmdshell Testing
                                                                  2. NoSQL Database Assessment
                                                                    1. MongoDB Assessment
                                                                      1. NoSQLMap
                                                                        1. MongoDB Configuration Review
                                                                        2. CouchDB Assessment
                                                                          1. Redis Assessment
                                                                        3. Database Configuration Analysis
                                                                          1. Default Credentials Testing
                                                                            1. Privilege Analysis
                                                                              1. Configuration Hardening Assessment
                                                                                1. Backup and Recovery Analysis
                                                                                2. Database Attack Techniques
                                                                                  1. Privilege Escalation
                                                                                    1. Data Exfiltration
                                                                                      1. Database Backdoors
                                                                                        1. Stored Procedure Abuse