
Oracle 8i Exploits - There are a still Oracle 8.1.7.4 instances out there (even if desupported). With a few simple commands everyone (with listener access) can overtake the listener first and after that your database. Listener Exploits - Learn why it is important to protect your TNS Listener. Red-Database-Security GmbH will soon publish a document how to find exploit code in the knowledge Hacker and script kiddies are using such code every day.ĭBAs and security professionals like pentester or auditors should know how to escalate privileges, becomeĭBA, become root, decrypt data, crash a database or doing a denial of service attack.Ī lot of proof-of-concept code can be found in Metalink if you know how to search in Metalink. in newsgroups, on websites (like bugtraq). This page does not not contain 0day exploits.Īll exploit code on this website is already out there, e.g. If your database or application server is hardened, all the exploits Tns listener, plsql function, plsql packages, forms, reports, isqlplus, ohs.

This section "Oracle Exploits / Exploit" (or Proof-of-Concept code)Ĭontains information about Oracle security vulnerabilities in several products like database, webcache,
