In the previous article, we tested the authorization scanning, weak password scanning, and unauthorized scanning of the database vulnerability scanning system. Today we tested the "penetration attack" under the Oracle database ", this module is destructive, so try not to test it in the actual environment. You are strongly advised to build a simulation environment for testing. OK, let's go!
To create a scan task, select Password Attack:
650) this. length = 650; "class =" aligncenter size-full wp-image-5867 "alt =" 1 "src =" http://www.bkjia.com/uploads/allimg/131227/0A454O50-0.png "width =" 550 "height =" 363 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>
After confirmation, the password test is automatically performed. After the test is completed, the next step is automatically entered. Enter the logon information:
650) this. length = 650; "class =" aligncenter size-full wp-image-5868 "alt =" 2 "src =" http://www.bkjia.com/uploads/allimg/131227/0A454OQ-1.png "width =" 370 "height =" 279 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>
We chose SQL Injection penetration:
650) this. length = 650; "class =" aligncenter size-full wp-image-5869 "alt =" 3 "src =" http://www.bkjia.com/uploads/allimg/131227/0A4543V6-2.png "width =" 550 "height =" 212 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>
If the injection vulnerability exists, common accounts may be used to obtain DBA permissions.
650) this. length = 650; "class =" aligncenter size-full wp-image-5870 "alt =" 4 "src =" http://www.bkjia.com/uploads/allimg/131227/0A4544149-3.png "width =" 477 "height =" 365 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>
Now we test penetration attacks-buffer overflow attacks:
650) this. length = 650; "class =" aligncenter size-full wp-image-5871 "alt =" 5 "src =" http://www.bkjia.com/uploads/allimg/131227/0A454N10-4.png "width =" 520 "height =" 144 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>
Penetration attacks against Oracle databases-buffer overflow attacks ...... You Xia security net WWW. YOUXIA. ORG solemnly reminds: It is very destructive. Do not test it in the production environment !)
650) this. length = 650; "class =" aligncenter size-full wp-image-5872 "alt =" 6 "src =" http://www.bkjia.com/uploads/allimg/131227/0A4542149-5.png "width =" 550 "height =" 322 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>
Sorry ...... Oracle did not pin down. We can see that penetration attacks using Oracle Database vulnerabilities have been successful ...... On the database server, we can see that the Oracle database is paralyzed!
650) this. length = 650; "class =" aligncenter size-full wp-image-5873 "alt =" 7 "src =" http://www.bkjia.com/uploads/allimg/131227/0A4546040-6.png "width =" 550 "height =" 236 "style =" margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; border-image: initial; border-width: initial; border-color: initial; text-align: center; float: none; clear: both; display: block; max-width: 600px; "/>
Of course, you can generate a database security assessment penetration test report, which will not be described here.
This "database vulnerability scan" topic contains 6 articles,:
- Evaluate database security by using database vulnerability scan 1 Overview
- Evaluate database security by using database vulnerability scan 2 create a scan task
- Use Database vulnerability scan to evaluate database security 3 Authorization Scan
- Evaluate database security by using database vulnerability scan 4 weak password Scan
- Evaluate database security using database vulnerability scan 5 unauthorized scanning
- Evaluate database security with database vulnerability scan 6 penetration attacks
Author: Zhang baichuan web Ranger) www.youxia.org reprinted please indicate the source! Thank you.
This article from the "Web Ranger Zhang baichuan)" blog, please be sure to keep this source http://youxia.blog.51cto.com/45281/1158089