Oracle Database Security Health Check

Picture a scene...

segregated subnets


Despite the claims of anti-virus vendors, malware problems are near impossible to control. Attackers own user workstation subnets and mobile devices, and very often malware either directly finds a route to databases (critical infrastructure) or it opens a tunnel for manual hacker gangs to exploit.

musangSeven Stone's software Musang targets Oracle Database 10g and 11g and gives organisations a quick and accurate view of Oracle Database security.

In critical cases (e.g. "crown jewels" hosting, credit card details, personal information with potential legal nightmares attached), Seven Stones long experience in Oracle Database security can be used to develop internal security solutions to good effect. More details...



This service varies from client to client, as it depends very much on the maturity of existing controls. This is usually the service which we need to perform as a first step. In summary, it's an information gathering workshop and it allows us to learn how we can best deliver value for our clients.

For more details, please consult our terms of engagement and service portfolio.


Vulnerability Assessment

When you see this title you probably think in terms of penetration testing. The reality is though that penetration testing, even when delivered properly (i.e. not using automated scanners and with all testing restrictions removed), doesn't lend itself to cost-effectiveness.

Generally, we only deliver these services when we are sure the clients' investment is justified in terms of risk.


Corporate Policies

At Seven Stones, we have no interest in consulting or delivering for clients, if the recommendations we make are likely to be implemented, but then forgotten after a change of staff, or just the passage of time.

Policies and standards (an ISO 27001 - based baseline policy, plus technical build standards) are very important, not least for helping to ensure that improved processes and practices are "carved in stone".


Incident Response

Incident response, and the whole area of best practices in incident management, are complex. If you think it's simple, then you probably don't have effective processes.

We have a track record of having dealt in this area with large firms in transport and finance, and we know what works in practice, as opposed to just theory.

For more details on our offering in incident response, click here

Security Macromorphosis

Sacred Cows

Latest Blog Post

Post Date: 8th April 2019


Musang – Oracle DB Security Testing – v1.8

Musang is a Docker-supplied Python/Django project for authenticated security testing scans for Oracle Database, for on-premise, or cloud SaaS, PaaS or IaaS stacks.

The last update of Musang (1.4) was in 2013! So this latest update (1.8) brings Musang into the modern age of old software by introducing support for 12c databases – after all i’m sure there are lots who upgraded from 9g. Right?

No but seriously, Oracle Database 12c introduces the concept of Containers and Pluggable Databases (PDB). It also stores password hashes in a dramatically different way (The mighty Pete Finnegan explains about these hashes so I don’t have to). The user doesn’t have to lose sleep worrying about such things – Musang auto-detects Database versions and selects the corresponding library of tests. However the connection string passed to the Database has to use the right ... link to original article




Security De-engineering, published in December 2011 by Taylor Francis, covers ubiquitous problems in information security and offers a solution in the final chapter

Areas covered: Penetration testing, Hackers, CASEs (Checklists and Standards Evangelists), IDS, Cloud Security, jobs in security, Identity Management, and organisational elements.






Literatecode was established in 2003 as an informal R&D lab and reorganized to a registered business in 2012.

Literatecode specializes in applied research and experimental development to help companies and individuals defend themselves against security threats.