First off I’m not how to do this, just a general question - no illegal activity here. :)
I see in articles/movies/whatever where a hacker gets into a database, begins downloading said database, and the connection is terminated at some point during the download. Say connection was terminated because the download was spotted.
Then you see something like “hacker was able to capture 80% of the database”.
How does this work? Is there a tool/script that’s used? I tried doing this at home by ssh’ing into a vm, started copying the db, closed connected, db was unreadable.
[link] [comments]
from hacking: security in practice https://ift.tt/FWeZpPH
Comments
Post a Comment