Evaluate database security with database vulnerability scan 6 penetration attacks

Source: Internet
Author: User

In the previous article, we tested the authorization scanning, weak password scanning, and unauthorized scanning of the database vulnerability scanning system. Today we tested the "penetration attack" under the Oracle database ", this module is destructive, so try not to test it in the actual environment. You are strongly advised to build a simulation environment for testing. OK, let's go!

To create a scan task, select Password Attack:

650) this. length = 650; "class =" aligncenter size-full wp-image-5867 "alt =" 1 "src =" http://www.bkjia.com/uploads/allimg/131227/0A454O50-0.png "width =" 550 "height =" 363 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>

After confirmation, the password test is automatically performed. After the test is completed, the next step is automatically entered. Enter the logon information:

650) this. length = 650; "class =" aligncenter size-full wp-image-5868 "alt =" 2 "src =" http://www.bkjia.com/uploads/allimg/131227/0A454OQ-1.png "width =" 370 "height =" 279 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>

We chose SQL Injection penetration:

650) this. length = 650; "class =" aligncenter size-full wp-image-5869 "alt =" 3 "src =" http://www.bkjia.com/uploads/allimg/131227/0A4543V6-2.png "width =" 550 "height =" 212 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>

If the injection vulnerability exists, common accounts may be used to obtain DBA permissions.

650) this. length = 650; "class =" aligncenter size-full wp-image-5870 "alt =" 4 "src =" http://www.bkjia.com/uploads/allimg/131227/0A4544149-3.png "width =" 477 "height =" 365 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>

Now we test penetration attacks-buffer overflow attacks:

650) this. length = 650; "class =" aligncenter size-full wp-image-5871 "alt =" 5 "src =" http://www.bkjia.com/uploads/allimg/131227/0A454N10-4.png "width =" 520 "height =" 144 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>

Penetration attacks against Oracle databases-buffer overflow attacks ...... You Xia security net WWW. YOUXIA. ORG solemnly reminds: It is very destructive. Do not test it in the production environment !)

650) this. length = 650; "class =" aligncenter size-full wp-image-5872 "alt =" 6 "src =" http://www.bkjia.com/uploads/allimg/131227/0A4542149-5.png "width =" 550 "height =" 322 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>

Sorry ...... Oracle did not pin down. We can see that penetration attacks using Oracle Database vulnerabilities have been successful ...... On the database server, we can see that the Oracle database is paralyzed!

650) this. length = 650; "class =" aligncenter size-full wp-image-5873 "alt =" 7 "src =" http://www.bkjia.com/uploads/allimg/131227/0A4546040-6.png "width =" 550 "height =" 236 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>

Of course, you can generate a database security assessment penetration test report, which will not be described here.

This "database vulnerability scan" topic contains 6 articles,:

  • Evaluate database security by using database vulnerability scan 1 Overview
  • Evaluate database security by using database vulnerability scan 2 create a scan task
  • Use Database vulnerability scan to evaluate database security 3 Authorization Scan
  • Evaluate database security by using database vulnerability scan 4 weak password Scan
  • Evaluate database security using database vulnerability scan 5 unauthorized scanning
  • Evaluate database security with database vulnerability scan 6 penetration attacks

Author: Zhang baichuan web Ranger) www.youxia.org reprinted please indicate the source! Thank you.

This article from the "Web Ranger Zhang baichuan)" blog, please be sure to keep this source http://youxia.blog.51cto.com/45281/1158089

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.