Abstract
This chapter will overview the vulnerability-scanning industry in terms of how it has developed and the commercial tools that are used. It will also introduce the tool I have used most, which is Perl based and enables custom interactions to be automated, such as scanning Database Control webpages to gain the database name, coupled with traditional TNS listener scanning for weak passwords. Finally, I will review some administrative and ethical considerations you should take before using the code in practice.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Paul Wright
About this chapter
Cite this chapter
Wright, P. (2014). Oracle Vulnerability Scanning. In: Protecting Oracle Database 12c. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6212-1_5
Download citation
DOI: https://doi.org/10.1007/978-1-4302-6212-1_5
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-6211-4
Online ISBN: 978-1-4302-6212-1
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)