Oracle資料庫安全資源-1

技術小美發表於2017-11-01

 

Oracle資料庫取證

Title: Oracle Forensics DDLDump
Author: David LitchfieldV3RITY LTD

Type: pdf

[Original


Title: Oracle Forensics Part 7: Using the Oracle System Change Number in Forensic Examinations
Author: David LitchfieldNGSSoftware

Type: pdf

[Original


Title: Cadfile
Author: David LitchfieldNGSSoftware

Type: Tool

[No Mirror] [Original


Title: Oracle Forensics
Author: Pete FinniganPeteFinnigan.com

Type: Slides / pdf

[No Mirror] [Original


Title: Oracle Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle Bin
Author: David LitchfieldNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Oracle Forensics Part 5: Finding Evidence of Data Theft in the Absence of Auditing
Author: David LitchfieldNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Blackhat 2007: Oracle Forensics
Author: David LitchfieldNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Oracle Forensics Part 4: Live Response
Author: David LitchfieldNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Oracle Forensics Part 3: Isolating Evidence of Attacks Against the Authentication Mechanism
Author: David LitchfieldNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Oracle Forensics Part 2: Locating Dropped Objects
Author: David LitchfieldNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Oracle Forensics Part 1: Dissecting the Redo Logs
Author: David LitchfieldNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Oracle Forensics in a Nutshell
Author: Paul WrightNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Oracle Database Forensics using Logminer
Author: Paul WrightNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Oracle Forensics: Collecting Evidence After an Attack
Author: Aaron NewmanAppsecinc

Type: Powerpoint

[Mirror] [Original


Oracle資料庫攻擊

Title: Hacking Aurora in Oracle 11g 
Author: David LitchfieldNGSSoftware

Type: PDF Document

[Mirror] [Original


Title: Exploiting PL/SQL Injection With Only CREATE SESSION Privileges in Oracle 11g 
Author: David LitchfieldNGSSoftware

Type: PDF Document

[Mirror] [Original


Title: Bypassing DBMS_ASSERT (in certain situations) 
Author: David LitchfieldNGSSoftware

Type: PDF Document

[Mirror] [Original


Title: Exploiting PL/SQL Injection Flaws with only CREATE SESSION Privileges 
Author: David LitchfieldNGSSoftware

Type: PDF Document

[Mirror] [Original


Title: Lateral SQL Injection: A New Class of Vulnerability in Oracle 
Author: David LitchfieldNGSSoftware

Type: PDF Document

[Mirror] [Original


Title: In-memory Backdoors in Oracle 
Author: David LitchfieldNGSSoftware

Type: Powerpoint Presentation

[Mirror] [Original


Title: *BETA* Oracle Assessment Kit
Author: David LitchfieldNGSSoftware

Type: Tool [Windows] / Zip

[Mirror] [Original


Title: Cursor Injection – A New Method for Exploiting PL/SQL Injection and Potential Defences
Author: David LitchfieldNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Cursor Snarfing – A New Class of Attack in Oracle
Author: David LitchfieldNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Oracle PL/SQL Injection (Blackhat Japan)
Author: David LitchfieldNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Hack Proofing Oracle Application Server
Author: David LitchfieldNGSSoftware

Type: Whitepaper / pdf

[Mirror] [Original


Title: Hack-proofing Oracle Databases
Author: Aaron NewmanAppSecInc

Type: Whitepaper / pdf

[Mirror] [Original


Title: Exploiting and Protecting Oracle
Author: Pete Finniganpetefinnigan.com

Type: Whitepaper / pdf

[Mirror] [Original
本文轉hackfreer51CTO部落格,原文連結:http://blog.51cto.com/pnig0s1992/566957,如需轉載請自行聯絡原作者


相關文章