did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470080221

The Oracle Hacker's Handbook Hacking and Defending Oracle

by
  • ISBN13:

    9780470080221

  • ISBN10:

    0470080221

  • Format: Paperback
  • Copyright: 2007-01-30
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $44.99

Summary

Knowledge is power, and the power can be yours While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. Like The Shellcoder's Handbook and The Database Hacker's Handbook, this in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure. Discover how to deal with the security flaws revealed in the Oracle RDBMS Explore some never-before-published forays into Oracle security holes and learn to defend them from attack Learn why independent security assessments are not necessarily a guarantee of safety See how Oracle 10g Release 2 has improved its security features and where the flaws remain Take advantage of extensive and valuable code downloads on the companion Web site at www.wiley.com/go/ohh Visit our Web site at www.wiley.com/go/ohh

Author Biography

DAVID LITCHFIELD is founder and chief research scientist of NGSSoftware Ltd., a UK-based security solutions provider. He has been recognized as the world's premier expert on Oracle database security, and is the designer of NGSSQuirreL, a powerful tool for identifying and assessing database vulnerability. David is a regular conference speaker and has lectured government agencies on security topics.

Table of Contents

About the Authorp. vi
Acknowledgmentsp. xiii
Introductionp. xv
Code Samples from the Bookp. xviii
Oracle and Securityp. xviii
The "Unbreakable" Marketing Campaignp. xix
Independent Security Assessmentsp. xx
The Futurep. xx
Overview of the Oracle RDBMSp. 1
Architecturep. 1
Processesp. 2
The File Systemp. 8
The Networkp. 9
Database Objectsp. 10
Users and Rolesp. 10
Privilegesp. 10
Oracle Patchingp. 11
Wrapping Upp. 13
The Oracle Network Architecturep. 15
The TNS Protocolp. 16
The TNS Headerp. 16
Inside the Packetp. 18
Getting the Oracle Versionp. 19
The Listener Version and Status Commandp. 20
Using the TNS Protocol Versionp. 20
Using the XML Database Versionp. 21
Using TNS Error Textp. 22
Using the TNS Version TTC Functionp. 23
Wrapping Upp. 24
Attacking the TNS Listener and Dispatchersp. 31
Attacking the TNS Listenerp. 31
Bypassing 10g Listener Restrictionsp. 32
The Aurora GIOP Serverp. 33
The XML Databasep. 38
Wrapping Upp. 42
Attacking the Authentication Processp. 43
How Authentication Worksp. 43
Attacks Against the Crypto Aspectsp. 48
Default Usernames and Passwordsp. 52
Looking in Files for Passwordsp. 53
Account Enumeration and Brute Forcep. 56
Long Username Buffer Overflowsp. 56
Wrapping Upp. 57
Oracle and PL/SQLp. 59
What Is PL/SQL?p. 59
PL/SQL Execution Privilegesp. 60
Wrapped PL/SQLp. 64
Wrapping and Unwrapping on 10gp. 64
Wrapping and Unwrapping on 9i and Earlierp. 64
Working without the Sourcep. 66
PL/SQL Injectionp. 66
Injection into Select Statements to Get More Datap. 68
Injecting Functionsp. 71
Injecting into Anonymous PL/SQL Blocksp. 72
The Holy Grail of PLSQL Injectionp. 72
Investigating Flawsp. 74
Direct SQL Execution Flawsp. 77
PL/SQL Race Conditionsp. 77
Auditing PL/SQL Codep. 80
The DBMS_Assert Packagep. 81
Some Real-World Examplesp. 82
Exploiting DBMS_CDC_IMPDPp. 82
Exploiting LTp. 84
Exploiting DBMS_CDC_Subscribe and DBMS_CDC_ISubscribep. 84
PLSQL and Triggersp. 89
Wrapping Upp. 89
Triggersp. 91
Trigger Happy: Exploiting Triggers for Fun and Profitp. 91
Examples of Exploiting Triggersp. 93
The MDSYS.SDO_GEOM_TRIG_INS1 and SDO_GEOM_TRIG_INS1 Triggersp. 93
The MDSYS SDO_CMT_CBK_TRIG Triggerp. 94
The SYS.CDC_Drop_CTable_Before Triggerp. 96
The MDSYS.SDO_Drop_User_Before Triggerp. 97
Wrapping Upp. 98
Indirect Privilege Escalationp. 99
A Hop, a Step, and a Jump: Getting DBA Privileges Indirectlyp. 99
Getting DBA from Create Any Triggerp. 99
Getting DBA from Create Any Viewp. 102
Getting DBA from Execute Any Procedurep. 105
Getting DBA from Just Create Procedurep. 105
Wrapping Upp. 105
Defeating Virtual Private Databasesp. 107
Tricking Oracle into Dropping a Policyp. 107
Defeating VPDs with Raw File Accessp. 112
General Privilegesp. 114
Wrapping Upp. 114
Attacking Oracle PL/SQL Web Applicationsp. 115
Oracle PL/SQL Gateway Architecturep. 115
Recognizing the Oracle PL/SQL Gatewayp. 116
PL/SQL Gateway URLsp. 116
Oracle Portalp. 118
Verifying the Existence of the Oracle PL/SQL Gatewayp. 118
The Web Server HTTP Server Response Headerp. 118
How the Oracle PL/SQL Gateway Communicates with the Database Serverp. 120
Attacking the PL/SQL Gatewayp. 122
The PLSQL Exclusion Listp. 122
Wrapping Upp. 129
Running Operating System Commandsp. 131
Running OS Commands through PL/SQLp. 131
Running OS Commands through Javap. 132
Running OS Commands Using DBMS_SCHEDULERp. 133
Running OS Commands Directly with the Job Schedulerp. 134
Running OS Commands Using Alter Systemp. 136
Wrapping Upp. 136
Accessing the File Systemp. 137
Accessing the File System Using the UTL_FILE Packagep. 137
Accessing the File System Using Javap. 139
Accessing Binary Filesp. 140
Exploring Operating System Environment Variablesp. 142
Wrapping Upp. 144
Accessing the Networkp. 145
Data Exfiltrationp. 145
Using UTL_TCPp. 146
Using UTL_HTTPp. 147
Using DNS Queries and UTL_INADDRp. 147
Encrypting Data Prior to Exfiltratingp. 149
Attacking Other Systems on the Networkp. 149
Java and the Networkp. 151
Database Linksp. 152
Wrapping Upp. 152
Default Usernames and Passwordsp. 153
Indexp. 177
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program