sql

AppliCure dotDefender and dotDefender Monitor

Applicure’s freeware tool dotDefender Monitor was highlighted in the latest SANS Top 20 Internet Security Risks as a tool to detect the latest emerging threat of vulnerabilities in web applications. Together with Applicure dotDefender it monitors and protects against internal…

Auditing Oracle in a Production Environment

This paper is based on real penetration testing of Oracle servers on HP-UX systems and the methodology the auditor must follow in order to combat the stringent situations which present themselves. We will dissect the errors and explore the ways…

The Justification for Authentication and Encryption

You will need to understand how to configure and compile Postgres from source code as many of the solutions require that your Postgres server has the necessary libraries and capabilities installed that the typical Linux Distro may be lacking. Author: ROBERT…

Oracle Database Server Security

This article is focused on Oracle Database Server Security. It is divided in three main parts. The First is about Oracle history, database products and architecture. The Second part is about basic methods of Oracle Hacking. The last part is…

N-Stalker

It doesn’t take much investigation to conclude that Web Applications are one of the fastest growing aspects of the new Web 2.0 internet. As a result most organizations have at least one Web Application running which presents a very convenient…

Acunetix Web Vulnerability Scanner Version 6.0.

The highlight of this new version is the AcuSensor Technology (AT), which takes web application scanning to a whole new level. AcuSensor Technology uses sensors placed inside the web application source code to record feedback during execution. Black box scanning…

Making Open Security Research Sustainable

The Open Source Business Model is broken and needs reworking? We’re all on the path to eventual failure and obscurity? I think not, but there are changes to be made. Author: MATTHEW JONKMAN Source: Hakin9 2/2009 https://hakin9.org An article in Business Week by…

Auditing Oracle in a Production Environment

This paper is based on real penetration testing of Oracle servers on HP-UX systems and the way the auditor has to follow to combat the stringencies that come in a way. We will dissect the errors and the way to…

SQL Injection in Action

Basic SQL Injection attacks have not gone away despite web 2.0 programming. In this article we will learn how to maintain earlier websites in order to protect against them. Author: ANTONIO FANELLI Source:   Hakin9 6/2008 https://hakin9.org   WHAT YOU WILL LEARN… Some basic…

Protecting Data in a Postgres Database

What if the cracker has the ultimate power to see and do things they are not authorized to possess? What if they acquire the privileges of the superuser himself? Author: ROBERT BERNIER Source: Hakin9 4/2008 https://hakin9.org WHAT YOU WILL LEARN… Restricting access on…