Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though databases are not externally accessible, they are still a target as most cyber-attacks penetrate the network perimeter and look for high value targets within your internal network. This educational webinar reviews and demonstrates the tools most used in database breaches including Metasploit, Nmap, database rootkits, and other tools. Tools are demonstrated and the indications of such use against the database are shown.
|Integrigy - The Tools Hackers Are Using Against Your Oracle Database.pdf||375.27 KB|