Enjoy Part 2 of 3 in this series from regular EH-Net Columnist. Feel free to give feedback and make suggestions as to what you'd like to see next from Chris.
Permanent link: [Article]-Oracle Web Hacking Part II
Chris Gates, CISSP, CISA, GCIH, GPEN, C|EH
In the first article, Oracle Web Hacking Part I
, I talked about scanning Oracle Application Servers for default content and how to use that content for information gathering. A pentester can utilize that information to run SQL queries and to gain a foothold into the network. I also talked about iSQLPlus and some fun things you can do with that application, if you are able to guess credentials for it. I also showed some Metasploit modules to help you accomplish all of it.
In Part 2 of 3 of this ongoing series of columns, Iíll dive into attacking the Oracle Application Server Portal (OracleAS Portal
). Iíll focus on Oracle 9i and 10g up to Release 2. With 11g (10.3.x) Oracle moved to Weblogic
, and itís completely different and therefore out of the scope of this series. But there are plenty of shops out there still using 9i and 10g, which gives us plenty of opportunity for breaking stuff. So, letís get to it.