This document discusses attacking MongoDB databases. It begins by describing what MongoDB is and some of its key features. It then discusses how to discover MongoDB instances using default ports and REST interfaces. Several types of vulnerabilities in MongoDB are listed, including execution of arbitrary JavaScript code and cross-site request forgery. The document demonstrates how to inject JavaScript into a site's REST interface to execute code in an administrator's browser and gain access. It provides an overview of how MongoDB is used by major companies and programming language drivers. Network interactions for authentication brute forcing and man-in-the-middle attacks are depicted. The document concludes with discussions of BSON data format, overwriting variables, reading memory, and features in languages like Ruby on Rails