Table of Contents
The Oracle Hacker's Handbook-Hacking and Defending Oracle
Introduction
Chapter 1 - Overview of the Oracle RDBMS
Chapter 2 - The Oracle Network Architecture
Chapter 3 - Attacking the TNS Listener and Dispatchers
Chapter 4 - Attacking the Authentication Process
Chapter 5 - Oracle and PL/SQL
Chapter 6 - Triggers
Chapter 7 - Indirect Privilege Escalation
Chapter 8 - Defeating Virtual Private Databases
Chapter 9 - Attacking Oracle PL/SQL Web Applications
Chapter 10 - Running Operating System Commands
Chapter 11 - Accessing the File System
Chapter 12 - Accessing the Network
Appendix A - Default Usernames and Passwords
1