4.5. Wrapping Up

This chapter has described how authentication works and ways of getting around it. These methods include bypassing authentication by exploiting overflows, attempting to use default known user IDs and passwords, account enumeration and brute force, and gleaning usernames and passwords from files. The goal of this chapter has been to show how to get access at any privilege level — upgrading those privileges to DBA is another matter discussed in the chapters that follow.

Get The Oracle® Hacker's Handbook: Hacking and Defending Oracle now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.