Anatomy of a Database Attack