CSTL Databases

Please click on the following tabs to reveal the knowledge depth required for a successful pass of the CSTL exam.

You will be given a random selection of questions. Please note exam content is subject to change due to circumstances beyond our control – use this as a guide and email us if you have any queries.

  • Understands and can demonstrate the remote exploitation of Microsoft SQL Server.
  • Understands and can demonstrate how access can be gained to a Microsoft SQL serverthrough the use of default accounts credentials and insecure passwords.
  • Can identify and extract useful information stored within a database (e.g. user account names and passwords, recovering passwords where possible).
  • Following the compromise of Microsoft SQL server, can use stored procedures to execute system commands, escalate privileges, read/write from/to the file system, and/or gain further access to a host.
  • Understands and can demonstrate the remote exploitation of an Oracle database.
  • Understands the security attributes of the Oracle TNS Listener service.
  • Can demonstrate how the software version and patch status can be obtained from an Oracle database.
  • Understands and can demonstrate how access can be gained to an Oracle database server through the use of default account credentials and insecure passwords.
  • Can identify and extract useful information stored within a database (e.g. user account names and passwords, recovering passwords where possible).
  • Following the compromise of an Oracle database server, can use stored procedures to execute system commands, escalate privileges,read/write from/to the file system, and/or gain further access to a host.

Understands and can demonstrate the remote exploitation of othercommon SQL database servers, such as MySQL and PostgreSQL.

Understands and can demonstrate the remote exploitation ofcommon no-SQL database servers, such as MongoDB.

Understands and can demonstrate how access can be gained tosuch a database server through the use of default accountscredentials and insecure passwords.

Can identify and extract useful information stored within a database (e.g. user account names and passwords, recovering passwords where possible).

  • Understands common connection and authentication methods used by web applications to connect to database servers.
  • Can recognise common database connection string formats, e.g. JDBC
  • Can identify running databases using from the SQL browser service.
  • Understands the difference between local SQL Server accounts and integrated auth, and the security implications of both.
  • Demonstrate the ability to execute operating system commands without xp_cmdshell.