期刊文献+

基于Oracle隐蔽后门的文件传输隧道技术

Hidden File Transfer Tunnel based on Oracle Undetectable Backdoor
原文传递
导出
摘要 随着信息存储负担加重,甲骨文(Oracle)数据库架构在诸多机构内被广泛采用,而相应的安全研究尚不全面。基于以往的某些信息隐藏技术尤其是超文本传输协议(Hypertext Transfer Protocol,HTTP)隧道技术,文中提出了一种基于Oracle隐蔽后门的文件传输方式,可用来进行跨网络的文件传输。利用已有的Oracle网络传输协议和自定义的函数或存储过程,可以简单绕过Oracle的安全机制实现对操作系统的直接访问。实验表明,此种文件传输隧道技术的灵活性高,隐蔽性好,不易被防火墙拦截。 With the increasing demand of information storage, Oracle database structure is widely adopted in all kinds of institutes, while the relative security research is not in an all-round way. Based on some former data ensconcing techniques, especially HTTP tunnel, a new type of data ensconcing and transferring method based on Oracle net protocol is proposed, which could be used in file transfer over different networks. Oracle protocol and user-defined function or stored procedure could be employed to simply bypass the Oracle's security mechanism and access the operation system directly. The experiment results indicate that hidden file transfer tunnel is of high flexibility and concealment, and also could hardly be blocked by a firewall.
出处 《信息安全与通信保密》 2011年第12期73-75,共3页 Information Security and Communications Privacy
关键词 数据库 隧道 文件传输 database tunnel file transfer
  • 相关文献

参考文献5

二级参考文献23

  • 1陈楠,薛质.SQL注入攻击的实现和防范[J].信息安全与通信保密,2005(1):48-50. 被引量:18
  • 2宁洪,等.数据库系统[M].北京:电子工业出版社,2004. 被引量:1
  • 3天鸿工作室.Oracle9i SQL与PL/SQL开发指南[M].北京:清华大学出版社,2005. 被引量:1
  • 4LITCHFIELD D. Exploiting PL/SQL Injection With Only CREATE SESSION Privileges In Oracle 11g[EB/OL]. [2007-02-21] [2010- 05-01 ]. http : //www.databasesecurity.com/oracle/plsql-injection- create-session.pdf. 被引量:1
  • 5LITCHFILED D. The Oracle Hacker's Handbook: Hacking and Defending Oracle[M]. Indianapolis, Indiana : Wiley Publishing, Inc., 2007: 59-60. 被引量:1
  • 6LITCHFIELD D. Exploiting PL/SQL Injection Flaws with only CREATE SESSION Privileges[EB/OL]. [2009-10-21] [2010-05-01]. http : //www.databasesecurity.com/oracle/plsql-injection-create- session.pdf. 被引量:1
  • 7SIDDHARTH S. Hacking Oracle from the Web: Exploiting SQL Injection from Web Application[EB/OL]. [2010-02-22] [2010-05- 01]. http : //Tsafe.com/assets/pdfs/Hacking_Oracle_From_Web_2.pdf. 被引量:1
  • 8LITCHFIELD D. Hacking Aurora in Oracle IIg[EB/OL]. [2009-10-14] [2010-05-01]. http: //www.databasesecurity.com/ HackingAurora.pdf. 被引量:1
  • 9KORNBURST A. Fortschritdiche SQL Injection in Webanwendungen, Comconsult 2009[EB/OL]. [2009-06-24] [2010-05-01]. http: // www.red-database-security.com/wp/confidence2009.pdf. 被引量:1
  • 10LITCHFIELD D. Securing PL/SQL Applications with DBMS_ ASSERT[EB/OL]. [2005-10-25] [2010-05-01]. http: //www ngssoftware.com/Libraries/Doc uments/Securing_PL_SQL_ Applications with DBMS ASSERT.sflb.ashx. 被引量:1

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部