<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Hacking_Oracle_From_Web</id>
		<title>Hacking Oracle From Web - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Hacking_Oracle_From_Web"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hacking_Oracle_From_Web&amp;action=history"/>
		<updated>2026-04-23T02:31:50Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hacking_Oracle_From_Web&amp;diff=66481&amp;oldid=prev</id>
		<title>Dhruvsoi: Created page with 'This talk will focus on exploiting SQL injections in web applications with oracle back-end. Mostly exploiting Oracle sql injections in web applications is considered to be restri…'</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hacking_Oracle_From_Web&amp;diff=66481&amp;oldid=prev"/>
				<updated>2009-07-24T06:58:41Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;#039;This talk will focus on exploiting SQL injections in web applications with oracle back-end. Mostly exploiting Oracle sql injections in web applications is considered to be restri…&amp;#039;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;This talk will focus on exploiting SQL injections in web applications with oracle back-end. Mostly exploiting Oracle sql injections in web applications is considered to be restricted to extraction of data only. Oracle database does not offer hacker friendly functionalities such as openrowset or xp_cmdshell for privilege escalation and O.S code execution. Further, as web API do not support execution of multiple query in single statement, the exploitation is further restricted.&lt;br /&gt;
&lt;br /&gt;
The Talk will highlight attack vector to achieve privilege escalation (from Scott to SYS) and O.S code execution by exploiting Oracle SQL injections in web applications. The talk will then focus on hacking other Oracle components from web such as Oracle Application server, Oracle Secure Back-up etc. Further, there will be demo of how a worm could target an Oracle back-end just as it targeted the SQL server applications.&lt;/div&gt;</summary>
		<author><name>Dhruvsoi</name></author>	</entry>

	</feed>