The Oracle Hacker's Handbook: Hacking and Defending Oracle | 拾書所

The Oracle Hacker's Handbook: Hacking and Defending Oracle

$ 765 元 原價 1,530

Description

* David Litchfield is the ultimate authority on breaking into Oracle, and this unique book contains everything he knows-most of which has never before been published
* Examines in depth all the techniques and tools that hackers use to break into Oracle database servers so that IT professionals can better understand the risk that their systems are exposed to and, in turn, build and employ better defensive strategies
* Helps database administrators and security practitioners recognize new threats and how to deal with those threats in the most effective and efficient way possible
* Addresses the constant onslaught of security breaches, holes, and hacks and how to prepare for whatever else might be coming down the pike
 
Table of Contents
About the Author.

Acknowledgments.

Introduction.

Code Samples from the Book.

Oracle and Security.

The “Unbreakable” Marketing Campaign.

Independent Security Assessments.

The Future.

Chapter 1 Overview of the Oracle RDBMS.

Architecture.

Processes.

The File System.

The Network.

Database Objects.

Users and Roles.

Privileges.

Oracle Patching.

Wrapping Up.

Chapter 2 The Oracle Network Architecture.

The TNS Protocol.

The TNS Header.

Inside the Packet.

Getting the Oracle Version.

The Listener Version and Status Command.

Using the TNS Protocol Version.

Using the XML Database Version.

Using TNS Error Text.

Using the TNS Version TTC Function.

Wrapping Up.

Chapter 3 Attacking the TNS Listener and Dispatchers.

Attacking the TNS Listener.

Bypassing 10g Listener Restrictions.

The Aurora GIOP Server.

The XML Database.

Wrapping Up.

Chapter 4 Attacking the Authentication Process.

How Authentication Works.

Attacks Against the Crypto Aspects.

Default Usernames and Passwords.

Looking in Files for Passwords.

Account Enumeration and Brute Force.

Long Username Buffer Overflows.

Wrapping Up.

Chapter 5 Oracle and PL/SQL.

What Is PL/SQL?

PL/SQL Execution Privileges.

Wrapped PL/SQL.

Wrapping and Unwrapping on 10g.

Wrapping and Unwrapping on 9i and Earlier.

Working without the Source.

PL/SQL Injection.

Injection into SELECT Statements to Get More Data.

Injecting Functions.

Injecting into Anonymous PL/SQL Blocks.

The Holy Grail of PLSQL Injection.

Investigating Flaws.

Direct SQL Execution Flaws.

PL/SQL Race Conditions.

Auditing PL/SQL Code.

The DBMS_ASSERT Package.

Some Real-World Examples.

Exploiting DBMS_CDC_IMPDP.

Exploiting LT.

Exploiting DBMS_CDC_SUBSCRIBE and DBMS_CDC_ISUBSCRIBE.

PLSQL and Triggers.

Wrapping Up.

Chapter 6 Triggers.

Trigger Happy: Exploiting Triggers for Fun and Profit.

Examples of Exploiting Triggers.

The MDSYS.SDO_GEOM_TRIG_INS1 and SDO_GEOM_TRIG_INS1 Triggers.

The MDSYS SDO_CMT_CBK_TRIG Trigger.

The SYS.CDC_DROP_CTABLE_BEFORE Trigger.

The MDSYS.SDO_DROP_USER_BEFORE Trigger.

Wrapping Up.

Chapter 7 Indirect Privilege Escalation.

AHop, a Step, and a Jump: Getting DBA Privileges Indirectly.

Getting DBA from CREATE ANY TRIGGER.

Getting DBA from CREATE ANY VIE

Brand Slider