AdvancedDatabasesAppSecExploitation

The Database Hacker's Handbook

Defending Database Servers

3 / 5

Litchfield, Anley, Heasman, and Grindlay's exhaustive 2005 reference on attacking and defending Oracle, SQL Server, DB2, MySQL, PostgreSQL, Sybase, and Informix — the era when the database engine itself was the soft target.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2005
Publisher
Wiley
Pages
500
Language
English

Read this if

Vulnerability researchers and DBAs interested in the genealogy of database security. The Oracle and SQL Server chapters are still the most thorough printed references on the engines' internal attack surface and the patterns Litchfield made famous.

Skip this if

Anyone needing current cloud-database (RDS, Aurora, Cosmos, BigQuery) tradecraft, modern application-layer SQLi (handled by The Web Application Hacker's Handbook), or NoSQL-injection techniques. The book pre-dates almost everything load-bearing in 2026 database security.

Key takeaways

  • Database engines were once routinely RCE-able from a low-privileged session; the chapters document why the discipline shifted toward managed cloud databases.
  • The Oracle PL/SQL injection material is still the canonical reference and influenced a generation of vulnerability research.
  • The book's structural argument — every database is a different OS — explains why per-engine deep knowledge is still required for serious database security work.

Notes

Pair with The Web Application Hacker's Handbook (Stuttard / Pinto) for the application-layer view that displaced most of this book's relevance and with Litchfield's later research (Oracle Hacker's Handbook, SQL Server vulnerability research) for the depth-on-one-engine companions. A historical reference today, but the only printed source of its kind for the engine-internals era.