Home / Educational Content / Database & Technology / The Tools Hackers Are Using Against Your Oracle Database

The Tools Hackers Are Using Against Your Oracle Database

Quest Forum Digital Event 2020

Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identity theft.  Even though databases are not externally accessible, they are still a target as most cyber-attacks penetrate the network perimeter and look for high-value targets within your internal network.  This session will review and demonstrate the tools most used in database breaches including Metasploit, Nmap, database rootkits, and other tools.  Each tool will be demonstrated and the indications of such use against the database will be shown.

Watch the full-length video

Premium Content: access is limited to Quest Corporate and Professional members.

Membership has its perks. Get unlimited access to the latest Oracle updates, event session replays, strategic content centers and special members-only programming, plus big discounts on conference registration, with a Quest Corporate or Professional membership. Quest is where you learn.

The Tools Hackers Are Using Against Your Oracle Database