The Oracle hacker's handbook hacking and defending Oracle

David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat ha...

Descripción completa

Detalles Bibliográficos
Autor principal: Litchfield, David, 1975- (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Indianapolis, Ind. : Wiley Technology Pub c2007.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627257806719
Tabla de Contenidos:
  • The Oracle® Hacker's Handbook: Hacking and Defending Oracle; Contents; Introduction; Chapter 1 Overview of the Oracle RDBMS; Architecture; Processes; The File System; The Network; Oracle Patching; Wrapping Up; Chapter 2 The Oracle Network Architecture; The TNS Protocol; Getting the Oracle Version; Wrapping Up; Chapter 3 Attacking the TNS Listener and Dispatchers; Attacking the TNS Listener; The Aurora GIOP Server; The XML Database; Wrapping Up; Chapter 4 Attacking the Authentication Process; How Authentication Works; Attacks Against the Crypto Aspects; Default Usernames and Passwords
  • Account Enumeration and Brute ForceWrapping Up; Chapter 5 Oracle and PL/SQL; What Is PL/SQL?; PL/SQL Execution Privileges; Wrapped PL/SQL; PL/SQL Injection; Investigating Flaws; Direct SQL Execution Flaws; PL/SQL Race Conditions; Auditing PL/SQL Code; The DBMS_ASSERT Package; Some Real-World Examples; Wrapping Up; Chapter 6 Triggers; Trigger Happy: Exploiting Triggers for Fun and Profit; Examples of Exploiting Triggers; Wrapping Up; Chapter 7 Indirect Privilege Escalation; A Hop, a Step, and a Jump: Getting DBA Privileges Indirectly; Wrapping Up; Chapter 8 Defeating Virtual Private Databases
  • Tricking Oracle into Dropping a PolicyDefeating VPDs with Raw File Access; General Privileges; Wrapping Up; Chapter 9 Attacking Oracle PL/SQL Web Applications; Oracle PL/SQL Gateway Architecture; Recognizing the Oracle PL/SQL Gateway; Verifying the Existence of the Oracle PL/SQL Gateway; Attacking the PL/SQL Gateway; Wrapping Up; Chapter 10 Running Operating System Commands; Running OS Commands through PL/SQL; Running OS Commands through Java; Running OS Commands Using DBMS_SCHEDULER; Running OS Commands Directly with the Job Scheduler; Running OS Commands Using ALTER SYSTEM; Wrapping Up
  • Chapter 11 Accessing the File SystemAccessing the File System Using the UTL_FILE Package; Accessing the File System Using Java; Accessing Binary Files; Exploring Operating System Environment Variables; Wrapping Up; Chapter 12 Accessing the Network; Data Exfiltration; Encrypting Data Prior to Exfiltrating; Attacking Other Systems on the Network; Java and the Network; Database Links; Wrapping Up; Appendix A Default Usernames and Passwords; Index