Contents
Chapter 1 Why Care About Database Security?
Which Database Is the Most Secure?
The State of Database Security Research
Classes of Database Security Flaws
Unauthenticated Flaws in Network Protocols
Authenticated Flaws in Network Protocols
Flaws in Authentication Protocols
Unauthenticated Access to Functionality
Arbitrary Code Execution in Intrinsic SQL Elements
Arbitrary Code Execution in Securable SQL Elements
Privilege Elevation via SQL Injection
Local Privilege Elevation Issues
Finding Flaws in Your Database Server
Don't Believe the Documentation
Debug the System to Understand How It Works
Identify Communication Protocols
Understand Arbitrary Code Execution Bugs
Chapter 2 The Oracle Architecture
Examining the Oracle Architecture
Oracle Processes and Oracle on the Network
Oracle Authentication and Authorization
GRANT ANY PRIVILEGE / ROLE / OBJECT PRIVILEGE
Injecting into SELECT Statements
Get The Database Hacker's Handbook: Defending Database Servers now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.