This chapter described how to attack Oracle and introduced a number of new methods . Before looking at how to defend the server, the next chapter examines how an attacker moves deeper into the operating system and into the rest of the network.