Penetration Testing mailing list archives
oracle VA/PT
From: Massimo <massimo.mail () quipo it>
Date: Tue, 27 Sep 2005 06:06:48 +0200
Hi to all.Some day ago I was quite surprised to see that on a server that was scanned with nessus and with emaze scanner that revealed no relevant security hole, there was oracle installed and active with all the default oracle user/password activated (i.e. system/manager, scott/tiger, etc).
What VA tool can find default user on oracle? Is it possible to find that info with Nessus (perhaps I can't use it at its best)?
Best Regards, Massimo PS I usually activate all the check on nessus and emaze. ------------------------------------------------------------------------------Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at:
http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- oracle VA/PT Massimo (Sep 27)
- Re: oracle VA/PT Lukasz Szczepanski (Sep 28)
- Re: oracle VA/PT jd (Sep 29)
- <Possible follow-ups>
- RE: oracle VA/PT Josh Perrymon (Sep 28)
- RE: oracle VA/PT Gus Fritschie (Sep 29)
- RE: oracle VA/PT Josh Perrymon (Sep 28)
- RE: oracle VA/PT Michael Gargiullo (Sep 28)
- Re: oracle VA/PT Joshua Wright (Sep 29)