This document summarizes techniques for hacking into Firebird/Interbase database engines, which have a very small 1% market share compared to databases like MySQL, MSSQL, Oracle, and PostgreSQL. It describes how an attacker can create files on the system containing web shells by inserting malicious code into database tables and committing it. It also explains how to achieve remote code execution o