Chapter 4. Attacking the Authentication Process
Getting full access to the database and its data is the endgame of most attackers — but simply getting any access is the first step. For those who do not already have a user ID or password, the authentication processes must be defeated first. Doing so can be as technical as exploiting a buffer overflow, to as simple as performing a brute force attack — or simply obtaining a user ID and password. This chapter deals with getting access to the database server itself by attacking the authentication process.
Get The Oracle® Hacker's Handbook: Hacking and Defending Oracle now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.