Table of Contents The Oracle Hacker's Handbook-Hacking and Defending Oracle Introduction Chapter 1 - Overview of the Oracle RDBMS Chapter 2 - The Oracle Network Architecture Chapter 3 - Attacking the TNS Listener and Dispatchers Chapter 4 - Attacking the Authentication Process Chapter 5 - Oracle and PL/SQL Chapter 6 - Triggers Chapter 7 - Indirect Privilege Escalation Chapter 8 - Defeating Virtual Private Databases Chapter 9 - Attacking Oracle PL/SQL Web Applications Chapter 10 - Running Operating System Commands Chapter 11 - Accessing the File System Chapter 12 - Accessing the Network Appendix A - Default Usernames and Passwords