Author: David Litchfield
Posted on 2007-06-24, updated at 2007-12-11. By anonymous.
- Author: David Litchfield
Knowledge is power, and the power can be yours.
While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems.
Like The Shellcoder's Handbook and The Database Hacker's Handbook, this in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.
Discover how to deal with the security flaws revealed in the Oracle RDBMS
Explore some never-before-published forays into Oracle security holes and learn to defend them from attack
Learn why independent security assessments are not necessarily a guarantee of safety
See how Oracle 10g Release 2 has improved its security features and where the flaws remain
Take advantage of extensive and valuable code downloads on the companion Web site at www.wiley.com/go/ohh
Visit our Web site at www.wiley.com/go/ohh
The Oracle Hacker's Handbook-Hacking and Defending Oracle
Chapter 1 - Overview of the Oracle RDBMS
Chapter 2 - The Oracle Network Architecture
Chapter 3 - Attacking the TNS Listener and Dispatchers
Chapter 4 - Attacking the Authentication Process
Chapter 5 - Oracle and PL/SQL
Chapter 6 - Triggers
Chapter 7 - Indirect Privilege Escalation
Chapter 8 - Defeating Virtual Private Databases
Chapter 9 - Attacking Oracle PL/SQL Web Applications
Chapter 10 - Running Operating System Commands
Chapter 11 - Accessing the File System
Chapter 12 - Accessing the Network
Appendix A - Default Usernames and Passwords
List of Figures
- Ebooks list page : 815
- 2010-05-23The Oracle Hacker’s Handbook: Hacking And Defending Oraclen
- 2010-05-23The Oracle Hacker?s Handbook: Hacking And Defending Oraclen
- 2010-05-22The Oracle Hacker’s Handbook: Hacking And Defending Oracle
- 2010-02-03The Oracle Hacker's Handbook: Hacking and Defending Oracle
- 2010-01-18The Oracle Hacker's Handbook: Hacking and Defending Oracle
- 2009-03-18The Oracle Hacker's Handbook: Hacking and Defending Oracle
- 2007-09-19The Oracle Hacker's Handbook: Hacking and Defending Oracle
- 2010-01-27The Oracle Hacker’s Handbook: Hacking and Defending Oracle
- 2017-06-18Become The Ultimate Hacker What Is Hacking, Why You Should Care, And How To Do It
- 2016-12-29[PDF] Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
- 2014-02-24The web application hacker's handbook: finding and exploiting security flaws (2nd edition)
- 2014-02-23The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2 edition (repost)
- 2013-12-28Gray Hat Hacking: The Ethical Hacker's Handbook (Repost)
- 2013-11-10The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws
- 2013-02-20The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws By Dafydd Stuttard, Marcus Pinto
- 2013-01-01Gray Hat Hacking: The Ethical Hacker’s Handbook 2nd Edition - Removed
- 2012-12-09The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws
- 2012-10-22The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (repost)
- 2012-08-17The Web Application Hacker's Handbook - Finding and Exploiting Security Flaws
- Download links and password may be in the description section, read description carefully!
- Do a search to find mirrors if no download links or dead links.