Insider and outsider database threats have more often than not posed a greater challenge as far as integrity and investigation of databases is concerned. Database forensic investigation is a process through which scientifically proven methods can be used to create a hypothesis that can prove or disprove the occurrence of a potential security incident. This paper explores the techniques that can be used to conduct forensic investigations of a compromised MySQL database. The authors have simulated investigative scenarios that have aided to conduct forensic investigative processes and the results are promising.