A brief look into SQL Injection attacks, Side Channel attacks, and an entropy based attack (password cracking) using a real life leaked database scenario. Each section includes details of how the attack works, and how to prevent/mitigate said attacks.