Submit Search
Upload
Joxean Koret - Database Security Paradise [Rooted CON 2011]
Report
Share
RootedCON
RootedCON
Follow
•
3 likes
•
2,030 views
1
of
70
Joxean Koret - Database Security Paradise [Rooted CON 2011]
•
3 likes
•
2,030 views
Report
Share
Download Now
Download to read offline
RootedCON
RootedCON
Follow
Recommended
Raúl Siles - Browser Exploitation for Fun and Profit Revolutions [RootedCON 2... by
Raúl Siles - Browser Exploitation for Fun and Profit Revolutions [RootedCON 2...
RootedCON
2.3K views
•
29 slides
Wtf is happening_inside_my_android_phone_public by
Wtf is happening_inside_my_android_phone_public
Jaime Blasco
2.8K views
•
32 slides
Eloi Sanfelix - Hardware security: Side Channel Attacks [RootedCON 2011] by
Eloi Sanfelix - Hardware security: Side Channel Attacks [RootedCON 2011]
RootedCON
2.4K views
•
45 slides
Francisco Jesús Gómez + Carlos Juan Diaz - Cloud Malware Distribution: DNS wi... by
Francisco Jesús Gómez + Carlos Juan Diaz - Cloud Malware Distribution: DNS wi...
RootedCON
7.1K views
•
62 slides
Sergi Álvarez + Roi Martín - radare2: From forensics to bindiffing [RootedCON... by
Sergi Álvarez + Roi Martín - radare2: From forensics to bindiffing [RootedCON...
RootedCON
1.8K views
•
23 slides
Threat stack aws by
Threat stack aws
Jen Andre
1.6K views
•
83 slides
More Related Content
What's hot
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo by
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Shakacon
2.9K views
•
70 slides
Codetainer: a Docker-based browser code 'sandbox' by
Codetainer: a Docker-based browser code 'sandbox'
Jen Andre
3.8K views
•
30 slides
Sheila Ayelen Berta - The Art of Persistence: "Mr. Windows… I don’t wanna go ... by
Sheila Ayelen Berta - The Art of Persistence: "Mr. Windows… I don’t wanna go ...
RootedCON
913 views
•
40 slides
"A rootkits writer’s guide to defense" - Michal Purzynski by
"A rootkits writer’s guide to defense" - Michal Purzynski
PROIDEA
330 views
•
83 slides
Laura Garcia - Shodan API and Coding Skills [rooted2019] by
Laura Garcia - Shodan API and Coding Skills [rooted2019]
RootedCON
1.5K views
•
13 slides
Defcon 22-colby-moore-patrick-wardle-synack-drop cam by
Defcon 22-colby-moore-patrick-wardle-synack-drop cam
Priyanka Aash
2.3K views
•
49 slides
What's hot
(20)
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo by Shakacon
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Shakacon
•
2.9K views
Codetainer: a Docker-based browser code 'sandbox' by Jen Andre
Codetainer: a Docker-based browser code 'sandbox'
Jen Andre
•
3.8K views
Sheila Ayelen Berta - The Art of Persistence: "Mr. Windows… I don’t wanna go ... by RootedCON
Sheila Ayelen Berta - The Art of Persistence: "Mr. Windows… I don’t wanna go ...
RootedCON
•
913 views
"A rootkits writer’s guide to defense" - Michal Purzynski by PROIDEA
"A rootkits writer’s guide to defense" - Michal Purzynski
PROIDEA
•
330 views
Laura Garcia - Shodan API and Coding Skills [rooted2019] by RootedCON
Laura Garcia - Shodan API and Coding Skills [rooted2019]
RootedCON
•
1.5K views
Defcon 22-colby-moore-patrick-wardle-synack-drop cam by Priyanka Aash
Defcon 22-colby-moore-patrick-wardle-synack-drop cam
Priyanka Aash
•
2.3K views
The day I ruled the world (RootedCON 2020) by Javier Junquera
The day I ruled the world (RootedCON 2020)
Javier Junquera
•
288 views
Richard wartell malware is hard. let's go shopping!! by Shakacon
Richard wartell malware is hard. let's go shopping!!
Shakacon
•
1.8K views
Simplest-Ownage-Human-Observed… - Routers by Logicaltrust pl
Simplest-Ownage-Human-Observed… - Routers
Logicaltrust pl
•
2.5K views
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac by Priyanka Aash
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Priyanka Aash
•
3.2K views
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у... by Positive Hack Days
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Positive Hack Days
•
2.5K views
Automated Malware Analysis and Cyber Security Intelligence by Jason Choi
Automated Malware Analysis and Cyber Security Intelligence
Jason Choi
•
1.1K views
44CON London - Attacking VxWorks: from Stone Age to Interstellar by 44CON
44CON London - Attacking VxWorks: from Stone Age to Interstellar
44CON
•
13.9K views
"Revenge of The Script Kiddies: Current Day Uses of Automated Scripts by Top ... by PROIDEA
"Revenge of The Script Kiddies: Current Day Uses of Automated Scripts by Top ...
PROIDEA
•
181 views
Possibility of arbitrary code execution by Step-Oriented Programming by kozossakai
Possibility of arbitrary code execution by Step-Oriented Programming
kozossakai
•
6.4K views
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen by PROIDEA
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
PROIDEA
•
297 views
Abusing Microsoft Kerberos - Sorry you guys don't get it by Benjamin Delpy
Abusing Microsoft Kerberos - Sorry you guys don't get it
Benjamin Delpy
•
43.1K views
When is something overflowing by Peter Hlavaty
When is something overflowing
Peter Hlavaty
•
6.3K views
How to drive a malware analyst crazy by Michael Boman
How to drive a malware analyst crazy
Michael Boman
•
1.1K views
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand... by Sergey Gordeychik
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Sergey Gordeychik
•
514 views
Viewers also liked
Jaime Peñalba - Como defenderse en terreno hostil: Protecciones para la Defco... by
Jaime Peñalba - Como defenderse en terreno hostil: Protecciones para la Defco...
RootedCON
2.3K views
•
47 slides
Marisol Salanova - Seguridad informática y cibersexo [RootedCON 2011] by
Marisol Salanova - Seguridad informática y cibersexo [RootedCON 2011]
RootedCON
1.4K views
•
38 slides
David Pérez + José Picó - Un ataque práctico contra comunicaciones móviles [R... by
David Pérez + José Picó - Un ataque práctico contra comunicaciones móviles [R...
RootedCON
2.6K views
•
43 slides
José Selvi - Unprivileged Network Post-Exploitation [RootedCON 2011] by
José Selvi - Unprivileged Network Post-Exploitation [RootedCON 2011]
RootedCON
1.3K views
•
53 slides
Gianluca D'Antonio - La Gestión de la Seguridad de la Información ante las nu... by
Gianluca D'Antonio - La Gestión de la Seguridad de la Información ante las nu...
RootedCON
1.2K views
•
21 slides
José Ramón Palanco - NoSQL Security [RootedCON 2011] by
José Ramón Palanco - NoSQL Security [RootedCON 2011]
RootedCON
1.4K views
•
40 slides
Viewers also liked
(19)
Jaime Peñalba - Como defenderse en terreno hostil: Protecciones para la Defco... by RootedCON
Jaime Peñalba - Como defenderse en terreno hostil: Protecciones para la Defco...
RootedCON
•
2.3K views
Marisol Salanova - Seguridad informática y cibersexo [RootedCON 2011] by RootedCON
Marisol Salanova - Seguridad informática y cibersexo [RootedCON 2011]
RootedCON
•
1.4K views
David Pérez + José Picó - Un ataque práctico contra comunicaciones móviles [R... by RootedCON
David Pérez + José Picó - Un ataque práctico contra comunicaciones móviles [R...
RootedCON
•
2.6K views
José Selvi - Unprivileged Network Post-Exploitation [RootedCON 2011] by RootedCON
José Selvi - Unprivileged Network Post-Exploitation [RootedCON 2011]
RootedCON
•
1.3K views
Gianluca D'Antonio - La Gestión de la Seguridad de la Información ante las nu... by RootedCON
Gianluca D'Antonio - La Gestión de la Seguridad de la Información ante las nu...
RootedCON
•
1.2K views
José Ramón Palanco - NoSQL Security [RootedCON 2011] by RootedCON
José Ramón Palanco - NoSQL Security [RootedCON 2011]
RootedCON
•
1.4K views
Alejandro Martín + Chema Alonso - Pulveriza tus publicaciones con Dust [Roote... by RootedCON
Alejandro Martín + Chema Alonso - Pulveriza tus publicaciones con Dust [Roote...
RootedCON
•
1.9K views
Gabriel Gonzalez - Man-In-Remote: PKCS11 for fun and non-profit [RootedCON 2011] by RootedCON
Gabriel Gonzalez - Man-In-Remote: PKCS11 for fun and non-profit [RootedCON 2011]
RootedCON
•
6.5K views
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011] by RootedCON
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
RootedCON
•
3K views
{RootedPanel] Grupo de Hackers Históricos: Apòstols [RootedCON 2010] by RootedCON
{RootedPanel] Grupo de Hackers Históricos: Apòstols [RootedCON 2010]
RootedCON
•
1.9K views
Antonio Ramos - La asimetría en el mercado de la seguridad [RootedCON 2011] by RootedCON
Antonio Ramos - La asimetría en el mercado de la seguridad [RootedCON 2011]
RootedCON
•
1.4K views
Alberto García de Dios - Virus, el arte no debería ser negocio [Rooted CON 2011] by RootedCON
Alberto García de Dios - Virus, el arte no debería ser negocio [Rooted CON 2011]
RootedCON
•
1.9K views
Blueliv - Information Tracking with Optos [Rooted CON 2011] by RootedCON
Blueliv - Information Tracking with Optos [Rooted CON 2011]
RootedCON
•
1.6K views
David López Paz - Global Warfare [RootedCON 2011] by RootedCON
David López Paz - Global Warfare [RootedCON 2011]
RootedCON
•
2.7K views
Vins Villaplana - Seguridad en capa de enlace [RootedCON 2011] by RootedCON
Vins Villaplana - Seguridad en capa de enlace [RootedCON 2011]
RootedCON
•
1.6K views
José Miguel Esparza - Obfuscation and (non-)detection of malicious PDF files ... by RootedCON
José Miguel Esparza - Obfuscation and (non-)detection of malicious PDF files ...
RootedCON
•
2.5K views
Jaime Blasco & Pablo Rincón - Lost in translation: WTF is happening inside m... by RootedCON
Jaime Blasco & Pablo Rincón - Lost in translation: WTF is happening inside m...
RootedCON
•
3.1K views
Hernan Ochoa - WCE Internals [RootedCON 2011] by RootedCON
Hernan Ochoa - WCE Internals [RootedCON 2011]
RootedCON
•
28.4K views
Alejandro Ramos - Know your ******: 4dv4nc3d P@55w0rd$ (r4c|<1ng [RootedCO... by RootedCON
Alejandro Ramos - Know your ******: 4dv4nc3d P@55w0rd$ (r4c|<1ng [RootedCO...
RootedCON
•
4.1K views
Similar to Joxean Koret - Database Security Paradise [Rooted CON 2011]
New and improved hacking oracle from web apps sumit sidharth by
New and improved hacking oracle from web apps sumit sidharth
owaspindia
1.8K views
•
31 slides
NanoSec Conference 2019: Code Execution Analysis in Mobile Apps - Abdullah Jo... by
NanoSec Conference 2019: Code Execution Analysis in Mobile Apps - Abdullah Jo...
Hafez Kamal
155 views
•
36 slides
Pilot Tech Talk #10 — Practical automation by Kamil Cholewiński by
Pilot Tech Talk #10 — Practical automation by Kamil Cholewiński
Pilot
180 views
•
31 slides
Timings of Init : Android Ramdisks for the Practical Hacker by
Timings of Init : Android Ramdisks for the Practical Hacker
Stacy Devino
10.7K views
•
21 slides
How We Analyzed 1000 Dumps in One Day - Dina Goldshtein, Brightsource - DevOp... by
How We Analyzed 1000 Dumps in One Day - Dina Goldshtein, Brightsource - DevOp...
DevOpsDays Tel Aviv
580 views
•
18 slides
Infrastructureascode slideshare-160331143725 by
Infrastructureascode slideshare-160331143725
miguel dominguez
53 views
•
167 slides
Similar to Joxean Koret - Database Security Paradise [Rooted CON 2011]
(20)
New and improved hacking oracle from web apps sumit sidharth by owaspindia
New and improved hacking oracle from web apps sumit sidharth
owaspindia
•
1.8K views
NanoSec Conference 2019: Code Execution Analysis in Mobile Apps - Abdullah Jo... by Hafez Kamal
NanoSec Conference 2019: Code Execution Analysis in Mobile Apps - Abdullah Jo...
Hafez Kamal
•
155 views
Pilot Tech Talk #10 — Practical automation by Kamil Cholewiński by Pilot
Pilot Tech Talk #10 — Practical automation by Kamil Cholewiński
Pilot
•
180 views
Timings of Init : Android Ramdisks for the Practical Hacker by Stacy Devino
Timings of Init : Android Ramdisks for the Practical Hacker
Stacy Devino
•
10.7K views
How We Analyzed 1000 Dumps in One Day - Dina Goldshtein, Brightsource - DevOp... by DevOpsDays Tel Aviv
How We Analyzed 1000 Dumps in One Day - Dina Goldshtein, Brightsource - DevOp...
DevOpsDays Tel Aviv
•
580 views
Infrastructureascode slideshare-160331143725 by miguel dominguez
Infrastructureascode slideshare-160331143725
miguel dominguez
•
53 views
Infrastructureascode slideshare-160331143725 by MortazaJohari
Infrastructureascode slideshare-160331143725
MortazaJohari
•
25 views
Infrastructure as code: running microservices on AWS using Docker, Terraform,... by Yevgeniy Brikman
Infrastructure as code: running microservices on AWS using Docker, Terraform,...
Yevgeniy Brikman
•
177.6K views
Dev Environments: The Next Generation by Travis Thieman
Dev Environments: The Next Generation
Travis Thieman
•
639 views
The Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori by Docker, Inc.
The Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori
Docker, Inc.
•
22.3K views
Docker Security by BladE0341
Docker Security
BladE0341
•
659 views
Joanna Rutkowska Subverting Vista Kernel by guestf1a032
Joanna Rutkowska Subverting Vista Kernel
guestf1a032
•
1.2K views
Docker, Linux Containers, and Security: Does It Add Up? by Jérôme Petazzoni
Docker, Linux Containers, and Security: Does It Add Up?
Jérôme Petazzoni
•
9.3K views
So. many. vulnerabilities. Why are containers such a mess and what to do abou... by Eric Smalling
So. many. vulnerabilities. Why are containers such a mess and what to do abou...
Eric Smalling
•
224 views
Node Security: The Good, Bad & Ugly by Bishan Singh
Node Security: The Good, Bad & Ugly
Bishan Singh
•
8.4K views
Chasing the Adder. A tale from the APT world... by Stefano Maccaglia
Chasing the Adder. A tale from the APT world...
Stefano Maccaglia
•
219 views
.NET Debugging Tips and Techniques by Bala Subra
.NET Debugging Tips and Techniques
Bala Subra
•
2.1K views
.Net Debugging Techniques by Bala Subra
.Net Debugging Techniques
Bala Subra
•
4K views
Sonatype DevSecOps Leadership forum 2020 by Daniel Garcia (a.k.a cr0hn)
Sonatype DevSecOps Leadership forum 2020
Daniel Garcia (a.k.a cr0hn)
•
172 views
Iz Pack by Inria
Iz Pack
Inria
•
736 views
More from RootedCON
Rooted2020 A clockwork pentester - Jose Carlos Moral & Alvaro Villaverde by
Rooted2020 A clockwork pentester - Jose Carlos Moral & Alvaro Villaverde
RootedCON
288 views
•
41 slides
rooted2020 Sandbox fingerprinting -_evadiendo_entornos_de_analisis_-_victor_c... by
rooted2020 Sandbox fingerprinting -_evadiendo_entornos_de_analisis_-_victor_c...
RootedCON
1K views
•
55 slides
Rooted2020 hunting malware-using_process_behavior-roberto_amado by
Rooted2020 hunting malware-using_process_behavior-roberto_amado
RootedCON
369 views
•
29 slides
Rooted2020 compliance as-code_-_guillermo_obispo_-_jose_mariaperez_-_ by
Rooted2020 compliance as-code_-_guillermo_obispo_-_jose_mariaperez_-_
RootedCON
408 views
•
22 slides
Rooted2020 the day i_ruled_the_world_deceiving_software_developers_through_op... by
Rooted2020 the day i_ruled_the_world_deceiving_software_developers_through_op...
RootedCON
352 views
•
86 slides
Rooted2020 si la-empresa_ha_ocultado_el_ciberataque,_como_se_ha_enterado_el_r... by
Rooted2020 si la-empresa_ha_ocultado_el_ciberataque,_como_se_ha_enterado_el_r...
RootedCON
304 views
•
15 slides
More from RootedCON
(20)
Rooted2020 A clockwork pentester - Jose Carlos Moral & Alvaro Villaverde by RootedCON
Rooted2020 A clockwork pentester - Jose Carlos Moral & Alvaro Villaverde
RootedCON
•
288 views
rooted2020 Sandbox fingerprinting -_evadiendo_entornos_de_analisis_-_victor_c... by RootedCON
rooted2020 Sandbox fingerprinting -_evadiendo_entornos_de_analisis_-_victor_c...
RootedCON
•
1K views
Rooted2020 hunting malware-using_process_behavior-roberto_amado by RootedCON
Rooted2020 hunting malware-using_process_behavior-roberto_amado
RootedCON
•
369 views
Rooted2020 compliance as-code_-_guillermo_obispo_-_jose_mariaperez_-_ by RootedCON
Rooted2020 compliance as-code_-_guillermo_obispo_-_jose_mariaperez_-_
RootedCON
•
408 views
Rooted2020 the day i_ruled_the_world_deceiving_software_developers_through_op... by RootedCON
Rooted2020 the day i_ruled_the_world_deceiving_software_developers_through_op...
RootedCON
•
352 views
Rooted2020 si la-empresa_ha_ocultado_el_ciberataque,_como_se_ha_enterado_el_r... by RootedCON
Rooted2020 si la-empresa_ha_ocultado_el_ciberataque,_como_se_ha_enterado_el_r...
RootedCON
•
304 views
Rooted2020 wordpress-another_terror_story_-_manuel_garcia_-_jacinto_sergio_ca... by RootedCON
Rooted2020 wordpress-another_terror_story_-_manuel_garcia_-_jacinto_sergio_ca...
RootedCON
•
277 views
Rooted2020 Atacando comunicaciones-de_voz_cifradas_-_jose_luis_verdeguer by RootedCON
Rooted2020 Atacando comunicaciones-de_voz_cifradas_-_jose_luis_verdeguer
RootedCON
•
510 views
rooted2020-Rootkit necurs no_es_un_bug,_es_una_feature_-_roberto_santos_-_jav... by RootedCON
rooted2020-Rootkit necurs no_es_un_bug,_es_una_feature_-_roberto_santos_-_jav...
RootedCON
•
440 views
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy by RootedCON
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
RootedCON
•
256 views
Rooted2020 taller de-reversing_de_binarios_escritos_en_golang_-_mariano_palom... by RootedCON
Rooted2020 taller de-reversing_de_binarios_escritos_en_golang_-_mariano_palom...
RootedCON
•
175 views
Rooted2020 virtual pwned-network_-_manel_molina by RootedCON
Rooted2020 virtual pwned-network_-_manel_molina
RootedCON
•
156 views
Rooted2020 van a-mear_sangre_como_hacer_que_los_malos_lo_paguen_muy_caro_-_an... by RootedCON
Rooted2020 van a-mear_sangre_como_hacer_que_los_malos_lo_paguen_muy_caro_-_an...
RootedCON
•
174 views
Rooted2020 todo a-siem_-_marta_lopez by RootedCON
Rooted2020 todo a-siem_-_marta_lopez
RootedCON
•
178 views
Rooted2020 live coding--_jesus_jara by RootedCON
Rooted2020 live coding--_jesus_jara
RootedCON
•
130 views
Rooted2020 legalidad de-la_prueba_tecnologica_indiciaria_cuando_tu_papi_es_un... by RootedCON
Rooted2020 legalidad de-la_prueba_tecnologica_indiciaria_cuando_tu_papi_es_un...
RootedCON
•
98 views
Rooted2020 hackeando el-mundo_exterior_a_traves_de_bluetooth_low-energy_ble_-... by RootedCON
Rooted2020 hackeando el-mundo_exterior_a_traves_de_bluetooth_low-energy_ble_-...
RootedCON
•
143 views
Rooted2020 evading deep-learning_malware_detectors_-_javier_yuste by RootedCON
Rooted2020 evading deep-learning_malware_detectors_-_javier_yuste
RootedCON
•
147 views
Rooted2020 encontrando 0days-en_2020_-_antonio_morales by RootedCON
Rooted2020 encontrando 0days-en_2020_-_antonio_morales
RootedCON
•
128 views
Rooted2020 emotet is-dead_long_live_emotet_-_victor_acin by RootedCON
Rooted2020 emotet is-dead_long_live_emotet_-_victor_acin
RootedCON
•
365 views
Joxean Koret - Database Security Paradise [Rooted CON 2011]
1.
Database's Security Paradise
Joxean Koret
2.
3.
4.
5.
Local Vulnerabilities in
Database Software
6.
Unidata
7.
8.
Send SIGUSR2 signal
to any process
9.
10.
Ingres
11.
12.
Welcome to '70s!
13.
14.
15.
16.
Ingres Developers...
17.
MySQL Client
18.
19.
20.
Stupid bug #1
21.
Stupid bug #2
22.
Stupid bug #2
23.
(Remote) Stupid bug
#3
24.
25.
IBM DB2
26.
27.
Local privilege escalation
28.
29.
30.
31.
32.
Oracle
33.
34.
35.
36.
Informix
37.
38.
39.
40.
Path to ifmx_dlopen
function
41.
42.
43.
44.
45.
Remote Vulnerabilities
46.
47.
Unidata
48.
49.
50.
51.
52.
IBM DB2
53.
54.
55.
56.
57.
58.
Informix
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
Search for bugs
;)
70.