Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

The problems
What are the hackers trying to do?
To protect Oracle think like a hacker
Recent press and research
Check who is a DBA
Why do we need Oracle Security?
Where can you find out about Oracle Security
Auditing Oracle for security issues -tools
What are the main security problem areas (1)
What are the main security problem areas (2)
What are the main security problem areas? (3)
The default password problem
Password cracking
An example cracking session
What is SQL Injection?
A built-in package exploit
Exploiting DBMS_METADATA (1)
Exploiting DBMS_METADATA (2)
10g Example exploits
Export extension bug –create the hack
Export extension –run the hack
DBMS_EXPORT_EXTENSION -output
Exploiting the listener
Issues with the listener
An example listener exploit
Sniffing an ALTER USER
PL/SQL Unwrapping
IDL –Interface description language
A Sample PL/SQL procedure –9i
A proof of concept un-wrapper
How do you protect Oracle?
Use Oracles Audit features
Summary / Conclusions
Questions and Answers
0 of .
Results for:
No results containing your search query
P. 1
Hacking and Securing Oracle

Hacking and Securing Oracle

Ratings: (0)|Views: 50|Likes:

More info:

Published by: Antonio Kalet Apaza Torres on Nov 26, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/26/2011

pdf

text

original

You're Reading a Free Preview
Pages 5 to 43 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->