Security Basics mailing list archives
Abusing Oracle's CREATE DATABASE LINK Privilege for fun and Profit
From: "Sumit Siddharth" <sid () notsosecure com>
Date: Tue, 8 Jul 2014 14:02:25 +0100
A small blog on how a web based SQLi can be abused to obtain privilege escalation and ultimately remote code execution against Oracle Database: http://www.notsosecure.com/blog/2014/07/08/abusing-oracles-create-database-l ink-privilege-for-fun-and-profit/ Thanks Sid Founder/Director NotSoSecure Limited, Twitter: @notsosecure www.notsosecure.com Upcoming events: The Art of Exploiting Injection Flaws. 2 days hands-on training Black Hat 2014, Las Vegas http://blackhat.com/us-14/training/the-art-of-exploiting-injection-flaws.htm l Advanced Android and iOS Exploitation: 3 days hands-on training in London http://www.eventbrite.co.uk/e/advanced-android-and-ios-exploitation-tickets- 11837214427?aff=erelexporg ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- Abusing Oracle's CREATE DATABASE LINK Privilege for fun and Profit Sumit Siddharth (Jul 08)