Oracle 黑客手册:Oracle 破坏与防御 The Oracle Hacker's Handbook pdf 下载 极速 mobi txt pdb lrf 网盘

Oracle 黑客手册:Oracle 破坏与防御 The Oracle Hacker's Handbook电子书下载地址
- 文件名
- [epub 下载] Oracle 黑客手册:Oracle 破坏与防御 The Oracle Hacker's Handbook epub格式电子书
- [azw3 下载] Oracle 黑客手册:Oracle 破坏与防御 The Oracle Hacker's Handbook azw3格式电子书
- [pdf 下载] Oracle 黑客手册:Oracle 破坏与防御 The Oracle Hacker's Handbook pdf格式电子书
- [txt 下载] Oracle 黑客手册:Oracle 破坏与防御 The Oracle Hacker's Handbook txt格式电子书
- [mobi 下载] Oracle 黑客手册:Oracle 破坏与防御 The Oracle Hacker's Handbook mobi格式电子书
- [word 下载] Oracle 黑客手册:Oracle 破坏与防御 The Oracle Hacker's Handbook word格式电子书
- [kindle 下载] Oracle 黑客手册:Oracle 破坏与防御 The Oracle Hacker's Handbook kindle格式电子书
内容简介:
Knowledge is power, and the power can be yours
While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems.
Like The Shellcoder's Handbook and The Database Hacker's Handbook, this in-depth guide explores every technique and tool used by black hat ***s to invade and compromise Oracle. It shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.
·Discover how to deal with the security flaws revealed in the Oracle RDBMS
·Explore some never-before-published forays into Oracle security ***s and learn to defend them from attack
·Learn why independent security assessments are not necessarily a guarantee of safety
·See how Oracle 10g Release 2 has improved its security features and where the flaws remain
·Take advantage of extensive and valuable code downloads on the companion Web site at www.wiley.com/go/ohh
Visit our Web site at www.wiley.com/go/ohh
书籍目录:
About the Author.
Acknowledgments.
Introduction.
Code Samples from the Book.
Oracle and Security.
The “Unbreakable” Marketing Campaign.
Independent Security Assessments.
The Future.
Chapter 1 Overview of the Oracle RDBMS.
Architecture.
Processes.
The File System.
The Network.
Database Objects.
Users and Roles.
Privileges.
Oracle Patching.
Wrapping Up.
Chapter 2 The Oracle Network Architecture.
The TNS Protocol.
The TNS Header.
Inside the Packet.
Getting the Oracle Version.
The Listener Version and Status Command.
Using the TNS Protocol Version.
Using the XML Database Version.
Using TNS Error Text.
Using the TNS Version T*** Function.
Wrapping Up.
Chapter 3 Attacking the TNS Listener and Dispatchers.
Attacking the TNS Listener.
Bypassing 10g Listener Restricti***.
The Aurora GIOP Server.
The XML Database.
Wrapping Up.
Chapter 4 Attacking the Authentication Process.
How Authentication Works.
Attacks Against the Crypto Aspects.
Default Usernames and Passwords.
Looking in Files for Passwords.
Account Enumeration and Brute Force.
Long Username Buffer Overflows.
Wrapping Up.
Chapter 5 Oracle and PL/SQL.
What Is PL/SQL?
PL/SQL Execution Privileges.
Wrapped PL/SQL.
Wrapping and Unwrapping on 10g.
Wrapping and Unwrapping on 9i and Earlier.
Working without the Source.
PL/SQL Injection.
Injection into SELECT Statements to Get More Data.
Injecting Functi***.
Injecting into Anonymous PL/SQL Blocks.
The Holy Grail of PLSQL Injection.
Investigating Flaws.
Direct SQL Execution Flaws.
PL/SQL Race Conditi***.
Auditing PL/SQL Code.
The DBMS_ASSERT Package.
Some Real-World Examples.
Exploiting DBMS_CDC_IMPDP.
Exploiting LT.
Exploiting DBMS_CDC_SUBSCRIBE and DBMS_CDC_ISUBSCRIBE.
PLSQL and Triggers.
Wrapping Up.
Chapter 6 Triggers.
Trigger Happy: Exploiting Triggers for Fun and Profit.
Examples of Exploiting Triggers.
The MDSYS.SDO_GEOM_TRIG_INS1 and SDO_GEOM_TRIG_INS1 Triggers.
The MDSYS SDO_CMT_CBK_TRIG Trigger.
The SYS.CDC_DROP_CTABLE_BEFORE Trigger.
The MDSYS.SDO_DROP_USER_BEFORE Trigger.
Wrapping Up.
Chapter 7 Indirect Privilege Escalation.
AHop, a Step, and a Jump: Getting DBA Privileges Indirectly.
Getting DBA from CREATE ANY TRIGGER.
Getting DBA from CREATE ANY VIEW.
Getting DBA from EXECUTE ANY PROCEDURE.
Getting DBA from Just CREATE PROCEDURE.
Wrapping Up.
Chapter 8 Defeating Virtual Private Databases.
Tricking Oracle into Dropping a Policy.
Defeating VPDs with Raw File Access.
General Privileges.
Wrapping Up.
Chapter 9 Attacking Oracle PL/SQL Web Applicati***.
Oracle PL/SQL Gateway Architecture.
Recognizing the Oracle PL/SQL Gateway.
PL/SQL Gateway URLs.
Oracle Portal.
Verifying the Existence of the Oracle PL/SQL Gateway.
The Web Server HTTP Server Resp***e Header.
How the Oracle PL/SQL Gateway Communicates with the Database Server.
Attacking the PL/SQL Gateway.
The PLSQL Exclusion List.
Wrapping Up.
Chapter 10 Running Operating System Commands.
Running OS Commands through PL/SQL.
Running OS Commands through Java.
Running OS Commands Using DBMS_SCHEDULER.
Running OS Commands Directly with the Job Scheduler.
Running OS Commands Using ALTER SYSTEM.
Wrapping Up.
Chapter 11 Accessing the File System.
Accessing the File System Using the UTL_FILE Package.
Accessing the File System Using Java.
Accessing Binary Files.
Exploring Operating System Environment Variables.
Wrapping Up.
Chapter 12 Accessing the Network.
Data Exfiltration.
Using UTL_***P.
Using UTL_***
Using DNS Queries and UTL_INADDR.
Encrypting Data Prior to Exfiltrating.
Attacking Other Systems on the Network.
Java and the Network.
Database Links.
Wrapping Up.
Appendix A Default Usernames and Passwords.
Index.
作者介绍:
暂无相关内容,正在全力查找中
出版社信息:
暂无出版社相关信息,正在全力查找中!
书籍摘录:
暂无相关书籍摘录,正在全力查找中!
在线阅读/听书/购买/PDF下载地址:
原文赏析:
暂无原文赏析,正在全力查找中!
其它内容:
编辑推荐
作者简介:
D***ID LI***HFIELD is founder and chief research scientist of NGSSoftware Ltd., a UK-based security soluti*** provider. He has been recognized as the world's premier expert on Oracle database security, and is the designer of NGSSQuirreL, a powerful tool for identifying and assessing database vulnerability. David is a regular conference speaker and has lectured government agencies on security topics.
书籍介绍
David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat ***s to invade and compromise Oracle and then it shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.
网站评分
书籍多样性:6分
书籍信息完全性:7分
网站更新速度:5分
使用便利性:9分
书籍清晰度:9分
书籍格式兼容性:8分
是否包含广告:7分
加载速度:8分
安全性:6分
稳定性:7分
搜索功能:7分
下载便捷性:6分
下载点评
- 无颠倒(315+)
- 内容齐全(313+)
- 服务好(562+)
- 好评(93+)
- 速度快(81+)
- 值得下载(415+)
- txt(237+)
下载评价
- 网友 芮***枫:
有点意思的网站,赞一个真心好好好 哈哈
- 网友 通***蕊:
五颗星、五颗星,大赞还觉得不错!~~
- 网友 堵***洁:
好用,支持
- 网友 沈***松:
挺好的,不错
- 网友 訾***雰:
下载速度很快,我选择的是epub格式
- 网友 常***翠:
哈哈哈哈哈哈
- 网友 曾***玉:
直接选择epub/azw3/mobi就可以了,然后导入微信读书,体验百分百!!!
- 网友 林***艳:
很好,能找到很多平常找不到的书。
- 网友 石***致:
挺实用的,给个赞!希望越来越好,一直支持。
- 网友 堵***格:
OK,还可以
- 网友 养***秋:
我是新来的考古学家
- 网友 家***丝:
好6666666
- 网友 菱***兰:
特好。有好多书
- 网友 相***儿:
你要的这里都能找到哦!!!
- 网友 融***华:
下载速度还可以
喜欢"Oracle 黑客手册:Oracle 破坏与防御 The Oracle Hacker's Handbook"的人也看了
济南故事第二辑·千佛山:遥望齐州九点烟 pdf 下载 极速 mobi txt pdb lrf 网盘
积水潭放射读片——骨肿瘤之上肢篇 pdf 下载 极速 mobi txt pdb lrf 网盘
电路理论及应用(面向21世纪高等院校精品教材)/电工电子基础系列 pdf 下载 极速 mobi txt pdb lrf 网盘
台湾——农之旅 pdf 下载 极速 mobi txt pdb lrf 网盘
流浪地球 pdf 下载 极速 mobi txt pdb lrf 网盘
欧式会所(2) pdf 下载 极速 mobi txt pdb lrf 网盘
键盘即兴弹奏指南 pdf 下载 极速 mobi txt pdb lrf 网盘
宇宙逍遥 pdf 下载 极速 mobi txt pdb lrf 网盘
新世纪韩国语系列教程 新世纪韩国语口语教程 初级上 外研社 9787513598491 pdf 下载 极速 mobi txt pdb lrf 网盘
重金属的生态地球化学与人群健康研究 pdf 下载 极速 mobi txt pdb lrf 网盘
- 小型室内设计公司生存之道 pdf 下载 极速 mobi txt pdb lrf 网盘
- 汽车底盘实训指导书(汽车运用与维修一体化教学通用教材中等职业 pdf 下载 极速 mobi txt pdb lrf 网盘
- 全教程 素描静物 分类训练 pdf 下载 极速 mobi txt pdb lrf 网盘
- 西方美学史 pdf 下载 极速 mobi txt pdb lrf 网盘
- 出埃及记(精装) pdf 下载 极速 mobi txt pdb lrf 网盘
- 中国文化精品译丛:西译中国现代散文选9787544658522 pdf 下载 极速 mobi txt pdb lrf 网盘
- 谜窟疑踪 pdf 下载 极速 mobi txt pdb lrf 网盘
- 海外直订Small Fingers Coloring Book: 4-8yrs 小指填色书:4-8岁 pdf 下载 极速 mobi txt pdb lrf 网盘
- 人人都能打造个人品牌 快速实现影响力飞跃与个人财富倍增 pdf 下载 极速 mobi txt pdb lrf 网盘
- 9787565907050 pdf 下载 极速 mobi txt pdb lrf 网盘
书籍真实打分
故事情节:7分
人物塑造:7分
主题深度:3分
文字风格:6分
语言运用:3分
文笔流畅:3分
思想传递:7分
知识深度:8分
知识广度:4分
实用性:4分
章节划分:4分
结构布局:6分
新颖与独特:4分
情感共鸣:9分
引人入胜:4分
现实相关:4分
沉浸感:7分
事实准确性:4分
文化贡献:5分