Call (800) 766-1884 for Oracle support & training
Free Oracle Tips

Oracle Consulting Support
Oracle Upgrades
Use New Oracle Features
Oracle Replication Support
Oracle Training
Remote Oracle DBA
System Documentation
Oracle Tips
Oracle Performance

Free Oracle Tips



BC Oracle tuning

Oracle training

Oracle support

Remote Oracle



  Oracle Tips by Burleson

Web Stalkers
Chapter 5 -
All About Cybercrime

Real World Case:  Website Hacking

He joked out loud to himself that he liked it, but deep down inside he felt really scared.  He immediately had the header replaced and then sat back to plan his next step.  Having one’s personal space violated, whether it’s a home burglary or a website invasion leaves one feeling violated and angry.

He decided that he was going to make this a learning experience and understand exactly what happened, how they did it, and how the FBI would respond to the crime.  To start, he accessed the File Transfer Protocol (FTP) log file on his web server.  He discovered:

  • The attacker entered by web domain at 5:38 a.m. using a valid password.

  • The attacker FTP’d a copy of the altered header.

  • The attacker downloaded the secure directory with an eCommerce shopping cart.

The following is a representation of what his FTP log looked like:

[17950] Login Wed Jul 28 05:47:32 2004
[17950] To 666.56.173.106( )
[17950] From ).
[17950] PWD[17950] FEAT
[17950] REST 100
[17950] REST 0

The above text is an excerpt from:

Web Stalkers
Protect yourself from Internet Criminals & Psychopaths
ISBN 0-97-45993-9-5

by Donald K. Burleson, Stephen Andert

Download your Oracle scripts now:

The definitive Oracle Script collection for every Oracle professional DBA


Oracle performance tuning software 

Oracle performance tuning book


Oracle performance Tuning 10g reference poster
Oracle training in Linux commands
Oracle training Excel
Oracle training & performance tuning books



Copyright © 1996 -  2014 by Burleson. All rights reserved.

Oracle® is the registered trademark of Oracle Corporation.