Quest Forum Digital Event 2020
Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identity theft. Even though databases are not externally accessible, they are still a target as most cyber-attacks penetrate the network perimeter and look for high-value targets within your internal network. This session will review and demonstrate the tools most used in database breaches including Metasploit, Nmap, database rootkits, and other tools. Each tool will be demonstrated and the indications of such use against the database will be shown.