lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <016b01cf9aac$dfc11860$9f434920$@notsosecure.com>
Date: Tue, 8 Jul 2014 14:02:25 +0100
From: "Sumit Siddharth" <sid@...sosecure.com>
To: <bugtraq@...urityfocus.com>, <security-basics@...urityfocus.com>
Subject: Abusing Oracle's CREATE DATABASE LINK Privilege for fun and Profit

A small blog on how a web based SQLi can be abused to obtain privilege
escalation and ultimately remote code execution against Oracle Database:

http://www.notsosecure.com/blog/2014/07/08/abusing-oracles-create-database-l
ink-privilege-for-fun-and-profit/ 

Thanks
Sid



Founder/Director
NotSoSecure Limited,
Twitter: @notsosecure
www.notsosecure.com 

Upcoming events:
The Art of Exploiting Injection Flaws. 2 days hands-on training Black Hat
2014, Las Vegas
http://blackhat.com/us-14/training/the-art-of-exploiting-injection-flaws.htm
l 
Advanced Android and iOS Exploitation: 3 days hands-on training in London
http://www.eventbrite.co.uk/e/advanced-android-and-ios-exploitation-tickets-
11837214427?aff=erelexporg 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ