Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Geek it 'till it MHz.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews



IObit Halloween Sale

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Sergei Strelec's WinPE
5. K-Lite Mega Codec Pack
6. Visual C++ Redistributable Runtimes AIO Repack
7. MusicBee
8. Format Factory
9. ImgBurn
10. ExplorerPatcher
More >>

top reads

Star 8 Windows Shortcuts That’ll Make You More Productive and Save You Time

Star Windows 10 Not Dead Yet - You Can Still Get Updates For Free

Star What is a '400 Bad Request - Request Header or Cookie Too Large' Error and How to Fix It

Star How to Fix Windows Install Error 0xC1900101

Star How to Force Enable Windows 10 Extended Security Updates If The Option Is Not Showing

Star Windows 11 25H2 is Out: What’s New and How to Get It Now.

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star Boost Your PC Speed with ReadyBoost: How a Thumb Drive Can Enhance Your System's Performance

Star 5 Hidden Windows Tools You’ve Had All Along But Never Use

Star Use the Windows 10 Media Creation Tool Before Support Ends For Windows 10 in 2025


MajorGeeks.Com » News » September 2012 » Brute-force attack on Oracle passwords feasible

Brute-force attack on Oracle passwords feasible


Contributed by: Email on 09/22/2012 03:36 PM [ comments Comments ]


A security researcher has provided details on vulnerabilities in the authentication protocol of Oracle's database that he originally discovered in 2010. The researcher, Esteban Martinez Fayó from security specialist AppSec, presented his findings and the methods by which they can be exploited at the ekoparty Security Conference; this is currently taking place in Buenos Aires.

Although Oracle closed the hole with the 11.2.0.3 patch set, which introduced the new version 12 of the protocol in mid-2011, Fayó said that there has been no fix for versions 11.1 and 11.2 of the database because the update was never included in any of Oracle's regular "critical patch updates". The researcher explained that unless administrators activate the new protocol manually, the database will continue to use the vulnerable version 11.2 protocol.

Fayó says that when a log-in attempt is made, the database server initially sends a session key and the salt value of the password hash. Apparently, potential attackers only require the name of a user and that of a database file; they can then abort communication with the server and launch a brute-force attack on the password offline. This method does not cause any failed log-in attempts to be recorded in the log files.

According to the researcher, the undisclosed security hole allows attackers to make a connection between the user's session key and password hash. Fayó said that the random salt value is designed to make brute-force attacks on this hash very difficult because it doesn't allow attackers to use, for example, rainbow tables.

He continued to explain that, although these tables can't be used in this attack, the passwords can be cracked quite efficiently using special hardware, such as GPUs, and hybrid dictionaries. The researcher noted that it is also possible to use cloud services. To crack a password, attackers will try out random character combinations until they find one that matches the hash of a given value. Once they have a match, it is highly likely that they have found the right password.






« MakeBot Releases Replicator 2 Desktop 3D Printer · Brute-force attack on Oracle passwords feasible · Daily Reviews Summary 09/23/12 @ NT Compatible »




Comments
comments powered by Disqus

MajorGeeks.Com » News » September 2012 » Brute-force attack on Oracle passwords feasible

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition