This document provides a summary of a presentation titled "Think Like A Hacker" about database attack vectors and techniques to thwart them. The presentation discusses common database hacking techniques such as SQL injection, unauthorized access via stolen or default credentials, and privilege escalation. It also outlines strategies for protecting databases, including applying patches, using secure coding practices with input validation and bind variables, limiting privileges, and encrypting sensitive data. The presentation emphasizes the importance of understanding hacking methods in order to strengthen database security.