Home page logo
/

pen-test logo Penetration Testing mailing list archives

oracle VA/PT
From: Massimo <massimo.mail () quipo it>
Date: Tue, 27 Sep 2005 06:06:48 +0200

Hi to all.

Some day ago I was quite surprised to see that on a server that was scanned with nessus and with emaze scanner that revealed no relevant security hole, there was oracle installed and active with all the default oracle user/password activated (i.e. system/manager, scott/tiger, etc).

What VA tool can find default user on oracle? Is it possible to find that info with Nessus (perhaps I can't use it at its best)?

Best Regards,
                Massimo
PS
I usually activate all the check on nessus and emaze.

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault