Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Database & SysAdmin
  3. Database
  4. Penetration testing of ORACLE DATABASE

Penetration testing of ORACLE DATABASE

Scheduled Pinned Locked Moved Database
databaseoraclesecuritytestingbeta-testing
19 Posts 6 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L Lost User

    How do we know your intentions are good?

    Unrequited desire is character building. OriginalGriff

    H Offline
    H Offline
    HARISHCHOWDHARY
    wrote on last edited by
    #10

    This is the major drawback when we are talking to each other on a virtual environment that there is no button called "Trust Authentication".But i can only tell you that go through my profile on internet(Facebook:Search Harry kaizen Ivon) if you feel like,as i don't have any intentions check-o-meter to make someone believe that i am a good man with really good intentions to improve the holes in the systems. Thanks for a great question.

    L 1 Reply Last reply
    0
    • L Lost User

      Nobody, is going to provide this sort of information on a public forum, even if they have it.

      Unrequited desire is character building. OriginalGriff

      H Offline
      H Offline
      HARISHCHOWDHARY
      wrote on last edited by
      #11

      If we do not share the information then how we can avoid attacks.I know public forum is that kind of place to share that kind of information but we can find some other way.

      1 Reply Last reply
      0
      • G GuyThiebaut

        There is an obvious test to try - however I am not going to tell you because: (1)Anyone with any serious experience of databases will know about this. (2)If you are working on a security testing project and are having to ask this question then you should not be on that project. (3)As others have said how can we trust your intentions? [edit ] in your favour with regards to (1) I have come across a few 'experienced' DBA's who themselves have not heard about this 'feature'...

        Continuous effort - not strength or intelligence - is the key to unlocking our potential.(Winston Churchill)
        H Offline
        H Offline
        HARISHCHOWDHARY
        wrote on last edited by
        #12

        I think you do not believe in Continuous effort - not strength or intelligence - is the key to unlocking our potential.(Winston Churchill)

        G 1 Reply Last reply
        0
        • H HARISHCHOWDHARY

          I think you do not believe in Continuous effort - not strength or intelligence - is the key to unlocking our potential.(Winston Churchill)

          G Offline
          G Offline
          GuyThiebaut
          wrote on last edited by
          #13

          I do! You just need to ask your question another 1,000,000,000,000,000,000 times and people will give you the answer - that's what I do and it always works ;) [edit] I think the reason why you have not had an answer so far is that the information you seek can be used to both protect and attack a system(that's why I won't give you the information)...

          Continuous effort - not strength or intelligence - is the key to unlocking our potential.(Winston Churchill)
          H 1 Reply Last reply
          0
          • J jschell

            HARISHCHOWDHARY wrote:

            Now please suggest me the ways to get into the database and to bypass the authentication mechanisms so that i can suggest the improvements of the security features of the application under test.

            1. You can research that and buy books on the subject. 2. I would suggest that you tell your employer (presumably there is one) that you are not the best person to do this because real testing requires real and substantial knowledge. Without that such testing is unlikely to be close to sufficient.

            H Offline
            H Offline
            HARISHCHOWDHARY
            wrote on last edited by
            #14

            Can you suggest me the name of the books as i have lot of them but in case if i missed an important one,, it will be a great help. Thanks :)

            1 Reply Last reply
            0
            • H HARISHCHOWDHARY

              This is the major drawback when we are talking to each other on a virtual environment that there is no button called "Trust Authentication".But i can only tell you that go through my profile on internet(Facebook:Search Harry kaizen Ivon) if you feel like,as i don't have any intentions check-o-meter to make someone believe that i am a good man with really good intentions to improve the holes in the systems. Thanks for a great question.

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #15

              The fact that you do not seem to understand the issues here speaks volumes about your suitability for the task you are asking about.

              Unrequited desire is character building. OriginalGriff

              1 Reply Last reply
              0
              • G GuyThiebaut

                I do! You just need to ask your question another 1,000,000,000,000,000,000 times and people will give you the answer - that's what I do and it always works ;) [edit] I think the reason why you have not had an answer so far is that the information you seek can be used to both protect and attack a system(that's why I won't give you the information)...

                Continuous effort - not strength or intelligence - is the key to unlocking our potential.(Winston Churchill)
                H Offline
                H Offline
                HARISHCHOWDHARY
                wrote on last edited by
                #16

                Before asking u i had already asked 2*999,999,999,999,999,999 times :-D Thanks for your support mate. ;) Some hints would certainly help.

                1 Reply Last reply
                0
                • H HARISHCHOWDHARY

                  Hi Friends, I am recently working on a Security and penetration testing project.I am able to get the Admin Page of the application.There are a lot of ways to proceed further now,can you suggest me some of the better way than others. Database used is ORACLE and application developed in the aspx.

                  P Offline
                  P Offline
                  Pete OHanlon
                  wrote on last edited by
                  #17

                  As others have pointed out, you aren't likely to get an answer here. There are two reasons: 1. Even if we believe that your intentions are good, this is a public forum which means that the answer is available for anybody to see; and we don't know their intentions. 2. Pen testing is a huge topic, best left to professionals. You can train in this side, and this might be your best option.

                  Forgive your enemies - it messes with their heads

                  "Mind bleach! Send me mind bleach!" - Nagy Vilmos

                  My blog | My articles | MoXAML PowerToys | Mole 2010 - debugging made easier - my favourite utility

                  1 Reply Last reply
                  0
                  • H HARISHCHOWDHARY

                    Hi Friends, I am recently working on a Security and penetration testing project.I am able to get the Admin Page of the application.There are a lot of ways to proceed further now,can you suggest me some of the better way than others. Database used is ORACLE and application developed in the aspx.

                    L Offline
                    L Offline
                    Lost User
                    wrote on last edited by
                    #18

                    Hi, I don't mean any disrespect... but if you have to ask these types of questions... maybe you should defer the security audit to a seasoned security professional. With that being said... some basics: 1.) Check for the Oracle default passwords. 2.) Implement an ascii permutative brute force password scanner. You could probably scan for weak passwords <= 5 characters in a single day. 3.) Use the Metasploit framework[^] to check for public vunerabilities[^]. 4.) Purchase a Zero-Day licence at one of the security research groups. I would recommend Vupen[^]. Best Wishes, -David Delaune

                    H 1 Reply Last reply
                    0
                    • L Lost User

                      Hi, I don't mean any disrespect... but if you have to ask these types of questions... maybe you should defer the security audit to a seasoned security professional. With that being said... some basics: 1.) Check for the Oracle default passwords. 2.) Implement an ascii permutative brute force password scanner. You could probably scan for weak passwords <= 5 characters in a single day. 3.) Use the Metasploit framework[^] to check for public vunerabilities[^]. 4.) Purchase a Zero-Day licence at one of the security research groups. I would recommend Vupen[^]. Best Wishes, -David Delaune

                      H Offline
                      H Offline
                      HARISHCHOWDHARY
                      wrote on last edited by
                      #19

                      Hi, Thanks for the help.Sometimes we have to ask this type of questions to find a new approach.But i am grateful for your answer. With Warm Regards, Harish Chaudhary

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups