![]() ![]() Example output of a TNS network analysis with Wireshark In the new window you can see the information that is exchanged between the database server and client, as you can see in the following picture. After loading the tcpdump file, select a TNS packet for analysis and select Fallow TCP Stream. After finishing the tests you can stop tcpdump and analyse the created dump file with Wireshark. ![]() Then you can connect via SQL*Plus and run test queries. Tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes This requires that tcpdump is installed in advanced. Here is an example of how to use tcpdump. The network traffic is collected either directly with Wireshark or with the help of tcpdump on the DB server. This way you can see exactly which TCP packets are sent from or to the DB server. The login process into the Oracle database can be performed most easily with a network analysis e.g. However, the scripts can also be used in another Oracle database container or Oracle database. The Docker container is based on oehrlis/docker. The scripts for this environment and the following demos are available in the GitHub repository oehrlis/orapwd. The following sketch shows the schematic structure of the environment. Demo EnvironmentĪ simple Docker container with Oracle Database 21.4.0.0 is used for the Lab environment. For this reason, I try to briefly pick up on one or the other point in this blog post. And as so often in today’s lecture, there was not enough time to go into all possible examples and demos. ![]() Therefore it is not always easy to concentrate on the essential points. Over the time, one or the other example on that subject accumulates. Database security and especially passwords have been on my mind for a while. Oracle Password Security is a small but central topic in database security. For me it was a premiere and a pleasure to be part of an Oracle event in Australia. This morning I had the great opportunity to participate in the virtual event AUSOUG Connect 2021 with my lecture Security Best Practice: Oracle passwords, but secure!. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |