The Oracle Hacker's Handbook: Hacking and Defending Oracle


Author: David Litchfield

Category: Technical

Tag: Security/Hacking


Posted on 2007-06-24, updated at 2007-12-11. By anonymous.

Description

  • Author: David Litchfield

Knowledge is power, and the power can be yours.

While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems.



Like The Shellcoder's Handbook and The Database Hacker's Handbook, this in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.



Discover how to deal with the security flaws revealed in the Oracle RDBMS

Explore some never-before-published forays into Oracle security holes and learn to defend them from attack

Learn why independent security assessments are not necessarily a guarantee of safety

See how Oracle 10g Release 2 has improved its security features and where the flaws remain

Take advantage of extensive and valuable code downloads on the companion Web site at www.wiley.com/go/ohh

Visit our Web site at www.wiley.com/go/ohh



CONTENTS



The Oracle Hacker's Handbook-Hacking and Defending Oracle

Introduction

Chapter 1 - Overview of the Oracle RDBMS

Chapter 2 - The Oracle Network Architecture

Chapter 3 - Attacking the TNS Listener and Dispatchers

Chapter 4 - Attacking the Authentication Process

Chapter 5 - Oracle and PL/SQL

Chapter 6 - Triggers

Chapter 7 - Indirect Privilege Escalation

Chapter 8 - Defeating Virtual Private Databases

Chapter 9 - Attacking Oracle PL/SQL Web Applications

Chapter 10 - Running Operating System Commands

Chapter 11 - Accessing the File System

Chapter 12 - Accessing the Network

Appendix A - Default Usernames and Passwords

Index

List of Figures

Sponsored High Speed Downloads
8656 dl's @ 3892 KB/s
Download Now [Full Version]
6597 dl's @ 3108 KB/s
Download Link 1 - Fast Download
5610 dl's @ 3735 KB/s
Download Mirror - Direct Download



Search More...
The Oracle Hacker's Handbook: Hacking and Defending Oracle

Search free ebooks in ebookee.com!


Related Archive Books

Archive Books related to "The Oracle Hacker's Handbook: Hacking and Defending Oracle":



Links
Download this book

Download links for "The Oracle Hacker's Handbook: Hacking and Defending Oracle":

External Download Link1:


Related Books

  1. Ebooks list page : 815
  2. 2010-05-23The Oracle Hacker’s Handbook: Hacking And Defending Oraclen
  3. 2010-05-23The Oracle Hacker?s Handbook: Hacking And Defending Oraclen
  4. 2010-05-22The Oracle Hacker’s Handbook: Hacking And Defending Oracle
  5. 2010-02-03The Oracle Hacker's Handbook: Hacking and Defending Oracle
  6. 2010-01-18The Oracle Hacker's Handbook: Hacking and Defending Oracle
  7. 2009-03-18The Oracle Hacker's Handbook: Hacking and Defending Oracle
  8. 2007-09-19The Oracle Hacker's Handbook: Hacking and Defending Oracle
  9. 2010-01-27The Oracle Hacker’s Handbook: Hacking and Defending Oracle
  10. 2016-12-29[PDF] Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
  11. 2014-02-24The web application hacker's handbook: finding and exploiting security flaws (2nd edition)
  12. 2014-02-23The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2 edition (repost)
  13. 2013-12-28Gray Hat Hacking: The Ethical Hacker's Handbook (Repost)
  14. 2013-11-10The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws
  15. 2013-02-20The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws By Dafydd Stuttard, Marcus Pinto
  16. 2013-01-01Gray Hat Hacking: The Ethical Hacker’s Handbook 2nd Edition - Removed
  17. 2012-12-09The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws
  18. 2012-10-22The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws (repost)
  19. 2012-08-17The Web Application Hacker's Handbook - Finding and Exploiting Security Flaws
  20. 2012-08-07The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Comments

No comments for "The Oracle Hacker's Handbook: Hacking and Defending Oracle".


    Add Your Comments
    1. Download links and password may be in the description section, read description carefully!
    2. Do a search to find mirrors if no download links or dead links.

    required

    required, will not be published

    need login

    required

    Not clear? Click here to refresh.

    Back to Top