The Tools Hackers Are Using Against Your Oracle Database
-
Posted by Quest Customer Learning Team
- Last updated 7/20/20
- Share
Quest Forum Digital Event 2020
Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identity theft. Even though databases are not externally accessible, they are still a target as most cyber-attacks penetrate the network perimeter and look for high-value targets within your internal network. This session will review and demonstrate the tools most used in database breaches including Metasploit, Nmap, database rootkits, and other tools. Each tool will be demonstrated and the indications of such use against the database will be shown.
Watch the full-length video
Premium Content: access is limited to Quest Corporate and Professional members.
Membership has its perks. Get unlimited access to the latest Oracle updates, event session replays, strategic content centers and special members-only programming, plus big discounts on conference registration, with a Quest Corporate or Professional membership. Quest is where you learn.