+

Tagged With / 'sql'

December 1, 2009

Articles Redaction No Comments

AppliCure dotDefender and dotDefender Monitor

Applicure’s freeware tool dotDefender Monitor was highlighted in the latest SANS Top 20 Internet Security Risks as a tool to detect the latest emerging threat of vulnerabilities in web applications. Together with Applicure dotDefender it monitors and protects against internal and external attacks on web servers and web applications. Author: Einat Adar Source: Hakin9  https://hakin9.org Quick start. […]

Read more

December 1, 2009

Articles Redaction No Comments

Auditing Oracle in a Production Environment

This paper is based on real penetration testing of Oracle servers on HP-UX systems and the methodology the auditor must follow in order to combat the stringent situations which present themselves. We will dissect the errors and explore the ways to bypass them in order to conduct the tests. Author: Source: https://hakin9.org WHAT YOU WILL LEARN… The […]

Read more

December 1, 2009

Articles Redaction No Comments

The Justification for Authentication and Encryption

You will need to understand how to configure and compile Postgres from source code as many of the solutions require that your Postgres server has the necessary libraries and capabilities installed that the typical Linux Distro may be lacking. Author: ROBERT BERNIER Source: Hakin9  https://hakin9.org WHAT YOU WILL LEARN… Confronting the DBA with an unauthorized person obtaining […]

Read more

December 1, 2009

Articles Redaction No Comments

Oracle Database Server Security

This article is focused on Oracle Database Server Security. It is divided in three main parts. The First is about Oracle history, database products and architecture. The Second part is about basic methods of Oracle Hacking. The last part is about Oracle Defense methods. Author: MIKOLÁŠ PANSKÝ Source: https://hakin9.org WHAT YOU WILL LEARN… General information about Oracle […]

Read more

May 1, 2009

Articles Redaction No Comments

My ERP Got Hacked – An Introduction to Computer Forensics, Part II

In Part I of this article we introduced the scenario described in the Third Forensic Challenge organised by the UNAM-CERT (Mexico) back in 2006. Author: ISMAEL VALENZUELA Source: Hakin9 5/2009 https://hakin9.org WHAT YOU SHOULD KNOW… Windows and Linux System Administration Intrusion and hacker techniques NTFS file system essentials WHAT YOU WILL LEARN… How to investigate security breaches and […]

Read more

April 1, 2009

Articles Redaction No Comments

N-Stalker

It doesn’t take much investigation to conclude that Web Applications are one of the fastest growing aspects of the new Web 2.0 internet. As a result most organizations have at least one Web Application running which presents a very convenient entry point for the potentially damaging exploitation of their internal network resources. Author: Don Iverson Source: Hakin9 […]

Read more

February 1, 2009

Articles Redaction No Comments

Acunetix Web Vulnerability Scanner Version 6.0.

The highlight of this new version is the AcuSensor Technology (AT), which takes web application scanning to a whole new level. AcuSensor Technology uses sensors placed inside the web application source code to record feedback during execution. Black box scanning combined with feedback provided by the sensors helps achieve more relevant results than using source […]

Read more

February 1, 2009

Articles Redaction No Comments

Making Open Security Research Sustainable

The Open Source Business Model is broken and needs reworking? We’re all on the path to eventual failure and obscurity? I think not, but there are changes to be made. Author: MATTHEW JONKMAN Source: Hakin9 2/2009 https://hakin9.org An article in Business Week by Stuart Cohen titled Open Source: The Model is Broken got my attention this week. In […]

Read more

February 1, 2009

Articles Redaction No Comments

How Does Your Benchmark of Physical Security Affect Your Environment?

Many of us are familiar with the equation: Risk = Threat x Vulnerability x Consequence and we have also learned that in order to make the most sense of that equation we must define, and then weigh, those three variables. Author: MARY ELLEN KENNEL Source: Hakin9 2/2009 https://hakin9.org WHAT YOU WILL LEARN… An increased awareness of security systems […]

Read more

June 1, 2008

Articles Redaction No Comments

Auditing Oracle in a Production Environment

This paper is based on real penetration testing of Oracle servers on HP-UX systems and the way the auditor has to follow to combat the stringencies that come in a way. We will dissect the errors and the way to bypass them to conduct the tests. Authors: ADITYA K SOOD, A.K.A. OKNOCK Source:  https://hakin9.org Hakin9 6/2008 WHAT YOU […]

Read more

June 1, 2008

Articles Redaction No Comments

SQL Injection in Action

Basic SQL Injection attacks have not gone away despite web 2.0 programming. In this article we will learn how to maintain earlier websites in order to protect against them. Author: ANTONIO FANELLI Source:   Hakin9 6/2008 https://hakin9.org   WHAT YOU WILL LEARN… Some basic SQL Injection techniques How to maintain earlier websites in order to prevent SQL Injection attacks […]

Read more

April 1, 2008

Articles Redaction No Comments

Protecting Data in a Postgres Database

What if the cracker has the ultimate power to see and do things they are not authorized to possess? What if they acquire the privileges of the superuser himself? Author: ROBERT BERNIER Source: Hakin9 4/2008 https://hakin9.org WHAT YOU WILL LEARN… Restricting access on the local host using Unix domain sockets Running encrypted sessions Client/server connections using SSL Using […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa