Chapter 1: Introduction
Intended audience
Chapter 2: Ten Stages of a network attack
IT Security
Anatomy of an Attack
Chapter 3: Oracle Database Primer
Oracle DB/SQL
Chapter 4: Oracle Security
Security Concepts
Client side issues
Oracle Patching
Application server issues
Network issues
Database issues
Operating system issues
Oracle Passwords
Privilege assignment
SQL injection
Buffer overflows
Java security
Oracle Assessment Kit
Chapter 5: Contemporary Oracle Server Attack Scenarios
Common Attacks
Scenario 1 Default user/password to gain access to passwords
Scenario 2 Exploiting an OS level vulnerability to gain
OSDBA account
Scenario 3 Escalating privilege of a low privileged user
account
Scenario 4 Brute forcing SYS AS SYSDBA using OraBrute
Traditional way to defend against these attacks
Chapter 6: Computer Forensic Incident Handling
Forensic Incident Handling
Definition of the term “forensic(s)”
Four core forensics technical tasks mapped from OS to Oracle
databases
Forensic Incident Response
Oracle forensics scenario 1 ~ Internal deletion - flashback
Oracle forensics scenario 2 OraBrute of sysdba
Oracle forensics scenario 3 Using BBED to find deleted data
Oracle forensics Scenario 4 DB Extended Audit to catch IDS
evasion
Oracle forensics Scenario 5 ~ DB audit is deleted by the
attacker
Oracle forensics Scenario 7 ~ No DB files left by the
attacker
Oracle forensics scenario Conclusion
Securing Oracle forensically using a Depository
Time synchronization as the foundation to a good forensic
incident response
Chapter 7: New Vulnerability Research
Looking for buffer overflows
Local Buffer overflow in Oracle
PLSQL Injection and finding examples
|
Chapter 8: Using DB Version Number for Vulnerability Status
Identification
Vunerability Status
Chapter 9: Oracle Patching Problems
Security Issues
Chapter 10: Using the OS to ascertain Patch activity
OPatch
Chapter 11: Ascertaining DB Vulnerability status
Ascertaining status independent of reported patch level
Checksum and package size method
Packages without ready made checksums ~ 9i and 8i
Packages with non-vulnerable checksums
Inferring DBAs patch activity from checksum pattern
Automating the collection of all checksums
Correlating timestamp with checksum
Making the PLSQL Package integrity verification more
forensically sound.
Chapter 12: Calculating retrospective risk to zero days
What is a Zero-Day?
Assessing retrospective Zero-days by checksum and timestamp
Correlating previous exploitation windows retrospectively
Flashing back vulnerable objects after patching
Chapter 13: Identifying Oracle Malware
Forensically identifying Oracle Malware such as rootkits
Chapter 14: Defeating Oracle Antiforensics
Defensive Strategy
Chapter 15: Depository Review ~ Quis custodiet ipsos custodes
Repository
Oracle Audit vault
Chapter 16: Handling forensic investigation data
Using databases to handle the data of an ongoing forensic
investigation
Chapter 17: Important Messages
Conclusions
Appendix A: The Boot CDs
The boot CDS
Appendix B: Object Reference Numbers
Object reference numbers for the object integrity query
Appendix C: DBMS_METADATA
List of object types and which object types DBMS_METADATA will
handle. |