This document discusses database hacking and data theft. It begins by providing statistics on the scale of data breaches in recent years, with over 100 million people having their data exposed. It then explains why database security is important, as databases store critical corporate, customer, and financial data. Common database attacks are outlined, such as password guessing, network sniffing, exploiting misconfigurations, and delivering Trojans. The document then demonstrates attacks against Oracle databases, including using a rootkit and backdoor to steal data remotely while remaining hidden. It provides scripts to install a rootkit and backdoor that communicates with an attacker's console to execute commands and exfiltrate data from the database.