Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

The problems
What are the hackers trying to do?
To protect Oracle think like a hacker
Recent press and research
Check who is a DBA
Why do we need Oracle Security?
Where can you find out about Oracle Security
Auditing Oracle for security issues -tools
What are the main security problem areas (1)
What are the main security problem areas (2)
What are the main security problem areas? (3)
The default password problem
Password cracking
An example cracking session
What is SQL Injection?
A built-in package exploit
Exploiting DBMS_METADATA (1)
Exploiting DBMS_METADATA (2)
10g Example exploits
Export extension bug –create the hack
Export extension –run the hack
Exploiting the listener
Issues with the listener
An example listener exploit
Sniffing an ALTER USER
PL/SQL Unwrapping
IDL –Interface description language
A Sample PL/SQL procedure –9i
A proof of concept un-wrapper
How do you protect Oracle?
Use Oracles Audit features
Summary / Conclusions
Questions and Answers
0 of .
Results for:
No results containing your search query
P. 1
Hacking and Securing Oracle

Hacking and Securing Oracle

Ratings: (0)|Views: 50|Likes:

More info:

Published by: Antonio Kalet Apaza Torres on Nov 26, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 43 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->