We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Honeypot your database

Formal Metadata

Title
Honeypot your database
Subtitle
And easy method to detect if you've been hacked
Title of Series
Number of Parts
611
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language
Production Year2017

Content Metadata

Subject Area
Genre
Abstract
Most database attackers are after your sensitive data. But there's no easy wayto detect them accessing the data since your application will be accessing ittoo. This is where honey-potting can be really useful. This session willdemonstrate a neat way to do honey-potting using nothing but existing MySQLtools. We will demonstrate how one can set up a "honey-pot table" and set alarmsaround it in such a way that, when the table is accessed the server will takedecisive actions to limit the session's access and warn the DBA. We will dowith nothing but stock tools available for the MySQL 5.7 server.