Implement a black box, external database security test that responds to the following:
- How will the scope be identified?
- What will indicate the end of a test?
- What special skills or characteristics will be required from the assessor that are not as necessary in white box testing scenarios?
- Identify and describe the first three main goals of the test.
- Explain at least three specific techniques that will be used to gather information.
- Explain as least three specific techniques that will be used as an attempt to obtain access to the system.
- Provide at least two special considerations unique to Oracle.
- Provide at least two special considerations unique to MySQL.
- Provide at least two special considerations unique to SQL Server.