Table of Contents
The following examples assume access to the database has been achieved through SQL Injection vulnerability in a web application.
Sometimes, against best practice, the application has connected to the database using superuser credentials.
2. Default configuration
In some systems the configuration files of PostgreSQL are owned by the user used to run the PostgreSQL process.
For example in my Ubuntu ...