Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

The Oracle Hackers Handbook: Hacking and Defending Oracle - ISBN 9780470080221

The Oracle Hackers Handbook: Hacking and Defending Oracle

ISBN 9780470080221

Autor: David Litchfield

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 203,70 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9780470080221

ISBN10:      

0470080221

Autor:      

David Litchfield

Oprawa:      

Paperback

Rok Wydania:      

2007-01-26

Ilość stron:      

216

Wymiary:      

231x193

Tematy:      

UT

Knowledge is power, and the power can be yours
While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems.
Like The Shellcoder′s Handbook and The Database Hacker′s Handbook, this in–depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.Discover how to deal with the security flaws revealed in the Oracle RDBMSExplore some never–before–published forays into Oracle security holes and learn to defend them from attackLearn why independent security assessments are not necessarily a guarantee of safetySee how Oracle 10g Release 2 has improved its security features and where the flaws remainTake advantage of extensive and valuable code downloads on the companion Web site at www.wiley.com/go/ohh
Visit our Web site at www.wiley.com/go/ohh

Spis treści:
About the Author.
Acknowledgments.
Introduction.
Code Samples from the Book.
Oracle and Security.
The “Unbreakable” Marketing Campaign.
Independent Security Assessments.
The Future.
Chapter 1 Overview of the Oracle RDBMS.
Architecture.
Processes.
The File System.
The Network.
Database Objects.
Users and Roles.
Privileges.
Oracle Patching.
Wrapping Up.
Chapter 2 The Oracle Network Architecture.
The TNS Protocol.
The TNS Header.
Inside the Packet.
Getting the Oracle Version.
The Listener Version and Status Command.
Using the TNS Protocol V ersion.
Using the XML Database Version.
Using TNS Error Text.
Using the TNS Version TTC Function.
Wrapping Up.
Chapter 3 Attacking the TNS Listener and Dispatchers.
Attacking the TNS Listener.
Bypassing 10g Listener Restrictions.
The Aurora GIOP Server.
The XML Database.
Wrapping Up.
Chapter 4 Attacking the Authentication Process.
How Authentication Works.
Attacks Against the Crypto Aspects.
Default Usernames and Passwords.
Looking in Files for Passwords.
Account Enumeration and Brute Force.
Long Username Buffer Overflows.
Wrapping Up.
Chapter 5 Oracle and PL/SQL.
What Is PL/SQL?
PL/SQL Execution Privileges.
Wrapped PL/SQL.
Wrapping and Unwrapping on 10g.
Wrapping and Unwrapping on 9i and Earlier.
Working without the Source.
PL/SQL Injection.
Injection into SELECT Statements to Get More Data.
Injecting Functions.
Injecting into Anonymous PL/SQL Blocks.
The Holy Grail of PLSQL Injection.
Investigating Flaws.
Direct SQL Execution Flaws.
PL/SQL Race Conditions.
Auditing PL/SQL Code.
The DBMS—ASSERT Package.
Some Real–World Examples.
Exploiting DBMS—CDC—IMPDP.
Exploiting LT.
Exploiting DBMS—CDC—SUBSCRIBE and DBMS—CDC—ISUBSCRIBE.
PLSQL and Triggers.
Wrapping Up.
Chapter 6 Triggers.
Trigger Happy: Exploiting Triggers for Fun and Profit.
Examples of Exploiting Triggers.
The MDSYS.SDO—GEOM—TRIG—INS1 and SDO—GEOM—TRIG—INS1 Triggers.
The MDSYS SDO—CMT—CBK—TRIG Trigger.
The SYS.CDC—DROP—CTABLE—BEFORE Trigger.
The MDSYS.SDO—DROP—USER—BEFORE Trigger.
Wrapping Up.
Chapter 7 Indirect Privilege Escalation.
AHop, a Step, and a Jump: Getting DBA Privileges Indirectly.
Getting DBA from CREATE ANY TRIGGER.
Getting DBA from CREATE ANY VIEW.
Getting DBA from EXECUTE ANY PROCEDURE.
Getting DBA from Just CREATE PROCEDURE.
Wrapping Up.
Chapter 8 Defeating Virtual Private Databases.
Tricking Oracle into Dropping a Policy.
Defeating VPDs with Raw File Access.
General Privileges.
Wrapping Up.
Chapter 9 Attacking Oracle PL/SQL Web Applications.
Oracle PL/SQL Gateway Architecture.
Recognizing the Oracle PL/SQL Gateway.
PL/SQL Gateway URLs.
Oracle Portal.
Verifying the Existence of the Oracle PL/SQL Gateway.
The Web Server HTTP Server Response Header.
How the Oracle PL/SQL Gateway Communicates with the Database Server.
Attacking the PL/SQL Gateway.
The PLSQL Exclusion List.
Wrapping Up.
Chapter 10 Running Operating System Commands.
Running OS Commands through PL/SQL.
Running OS Commands through Java.
Running OS Commands Using DBMS—SCHEDULER.
Running OS Commands Directly with the Job Scheduler.
Running OS Commands Using ALTER SYSTEM.
Wrapping Up.
Chapter 11 Accessing the File System.
Accessing the File System Using the UTL—FILE Package.
Accessing the File System Using Java.
Accessing Binary Files.
Exploring Operating System Environment Variables.
Wrapping Up.
Chapter 12 Accessing the Network.
Data Exfiltration.
Using UTL—TCP.
Using UTL—HTTP.
Using DNS Queries and UTL—INADDR.
Encrypting Data Prior to Exfiltrating.
Attacking Other Systems on the Network.
Java and the Network.
Database Links.
Wrapping Up.
Appendix A Default Usernames and Passwords.
Index.

Nota biograficzna:
DAVID LITCHFIELD is founder and chief research scientist of NGSSoftware Ltd., a UK–based security solutions provider. He has been recognized as the world′s premier expert on Oracle database security, and is the designer of NGSSQuirreL, a powerful tool for identifying and assessing database vulnerability. David is a regula r conference speaker and has lectured government agencies on security topics.

Okładka tylna:
Knowledge is power, and the power can be yours
While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems.
Like The Shellcoder′s Handbook and The Database Hacker′s Handbook, this in–depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.Discover how to deal with the security flaws revealed in the Oracle RDBMSExplore some never–before–published forays into Oracle security holes and learn to defend them from attackLearn why independent security assessments are not necessarily a guarantee of safetySee how Oracle 10g Release 2 has improved its security features and where the flaws remainTake advantage of extensive and valuable code downloads on the companion Web site at www.wiley.com/go/ohh
Visit our Web site at www.wiley.com/go/ohh

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy