Auditing an Oracle database for security issues is very important. provides all of the information and tools that you will need Click here for details of Limited's detailed Oracle database security audit service Click here for details of Limited's Oracle Security Training Courses
There are 54 visitors online    
Cookie Policy:We only use essential cookies on small sections of this website. For details see here.

Pete Finnigan's Oracle security weblog

Home » Archives » December 2006 » Evading Oracle IDS and audit appliances

[Previous entry: "Hacking and hardening Oracle Express Edition - UKOUG 2006"] [Next entry: "Oracle 11g will have SHA-1 hashed passwords and case sensitive passwords"]

Evading Oracle IDS and audit appliances

December 20th, 2006 by Pete

I made a note of a post on Steve Kosts blog titled "Evading Oracle IDS and Auditing Solutions" last week to come back and have a look. Steve Kost and Jack Kanter have released a new paper titled "Evading Network-Based Oracle Database Intrusion Detection Systems" that shows how easy it is to evade Oracle IDS solutions and audit solutions especially those that use signature based rules to detect abuse.

This is a great paper that covers SQL*Net fragmentation, encryption, obfuscation techniques and dynamic SQL. This is a paper worth reading.

December 2006

This is the weblog for Pete Finnigan. Pete works in the area of Oracle security and he specialises in auditing Oracle databases for security issues. This weblog is aimed squarely at those interested in the security of their Oracle databases.

Weblog Home
Weblog Archives

Oracle Security Tools page
Oracle security papers
Oracle Security alerts

Web Development
SQL Server Security

Atom 0.3 FEED
Powered by gm-rss 2.0.0

Valid XHTML 1.0!