Oracle Substitution Exploits
Versions: ALL

Overview
A substitution exploit is an attack that attempts hides from behavior monitoring the true intent of code/commands submitted to the database. Successful Substitution Attacks attempt to evade monitoring by making a targeted statement appear innocent so that it is not logged, so that does not trigger an alert, or so that if logged members of the security team do not recognize its hostile intent.

Consider the following: There is no excuse for any human to ever execute DBMS_SYS_SQL.PARSE_AS_USER. Any use of this built-in functionality should be considered highly suspicious. But, if members of the CISO's and DBA teams, are not aware of the danger, what are the chances they will act immediately to fully investigate a usage found in an audit log? History eaches us that the usage will be ignored.

The "Topics" referenced with the links, below, are 8separate Substitution exploits explained and demonstrated here in DBSecWorx online resources. Many more are possible, limited only by the imagination and effort the attacker is willing to invest.

Related Topics
Base64 Exploit
Cast To RAW Exploit
NoSpaces Exploit
REPLACE Exploit
TRANSLATE Exploit
UTL_ENCODE
UTL_I18N
UTL_RAW
WRAP Exploit