Auditing privileges
Generally complex applications use multiple schemas to query and save data. Also an attacker who connects successfully to a schema, such as system
, may quickly attempt to exploit the additional access provided by select any
, delete any
, insert
, and update any
privileges.
To track these activities we need to audit these higher level privileges in order to ensure that we are capturing the use of them.
In this recipe we will grant select any table
, delete any table
, and update any table
to users SMAVRIS
and DREPHNEAL
. Next, we will start to audit these statements and execute select
, delete
, and update
statements against the hr_emp_details_aud
table.
Getting ready
All steps will be performed on the HACKDB
database.
How it works...
Connect as the user
system
, grantselect any table
,delete any table
, andupdate any table
to usersDRAPHEAL
andSMAVRIS
as follows:SQL> conn system Enter password: Connected. SQL> SQL> grant select any table,delete any table,update any table...