Pen Testing Databases
|
|
|
- Griselda Hart
- 10 years ago
- Views:
Transcription
1 Pen Testing Databases by Michael T. Raggo, CISSP, NSA-IAM, CCSI, SCSA, CSI ISSA Charlotte Charlotte, NC, March 25 th, 2008
2 Objectives The objective of this session is to familiarize attendees with common and more uncommon database vulnerabilities and exploits. Weaknesses of common databases will be covered, as well as assessment tools and security best practices for protecting these databases. Topics include: SQL Server Oracle Other Databases
3 Goal Goal Gain administrator level access to the Database How? Gain Access to the Operating System housing the DB Gain Access to the Database via remote listener/client Break into the datacenter and sit at the console (C mon, we re not Kevin Mitnick!). Remember, this is Ethical hacking. We don t want to Remember, this is Ethical hacking. We don t want to damage or steal information from the your company s or customer s database. We simply want to identify vulnerabilities and prove a point. We were able to remotely access your database.
4 Microsoft SQL Server SQL Server Versions SQL Server 7.0 SQL Server 2000 Microsoft Desktop Engine (MSDE) 2000 Free, redistributable version that can be distributed with 3 rd -Party software No GUI, limited concurrent connections and scalability SQL Server 2005 (multiple versions) Interesting fact: A recent survey of SQL Server Magazine readers showed that 81 percent are still on SQL Server 2000 and only 40 percent are using SQL Server 2005.
5 Microsoft SQL Server 2005 Improvements Regardless of authentication mode and policy enforcement, SQL Server 2005 Setup Wizard does not permit blank passwords for sa account during the installation. YEAHHHHH!!! Password complexity improved for SQL Server passwords: length of the password must be at least 6 characters password must contain at least three out of four types of characters such as uppercase letters, lowercase letters, numbers, and non-alphanumeric characters password can not match any of the values: "Admin", "Administrator", "Password", "sa", "sysadmin", name of the compute hosting SQL Server installation, and all or part of the name of currently logged on Windows account.
6 Microsoft SQL Server Ports SQL Server Ports 1433 tcp Client Database connectivity 1434 udp New in SQL Server 2000 and higher SQL Monitor aka SQL Server Resolution Service (SSRS) Referral services for multiple server instances running on same machine Returns the IP address and port number of SQL Server instance 2433 tcp Default port when the "Hide server" check box is selected in the TCP/IP properties of the Server Network Utility. Little know fact Other than the default instance running on port 1433, additional instances run on ports which are dynamically assigned!
7 Microsoft SQL Server Authentication SQL Server Authentication Windows Only (aka Windows Mode Only) Clients present their credentials to the operating system and are identified and authenticated via their SID (Security Identifier) Advantages Connection string contains no password Ease of administration (leveraging your existing Windows infrastructure) Can grant by Window groups and per user Windows security model supports security options that SQL authentication does not Account lockout Password Lifetimes Complexity Rules Disadvantages Problematic when clients are not Windows-based
8 Microsoft SQL Server Authentication SQL Server Authentication (continued) SQL Server and Windows mode (aka Mixed Mode) Clients present their credentials to the operating system and are identified and authenticated via their SID (Security Identifier) OR Clients are authenticated through the native SQL Server authentication Advantages Ease of administration in that no NT users need to be created Client platform independent Disadvantages Lack advanced security features Doesn t stand up to Brute Force attacks
9 Microsoft SQL Server Encryption SQL Server 7 Passwords sent in the clear (if using Mixed Mode SQL Server Authentication) Encrypted if client installs necessary drivers Simple hash, more on this later SQL Server 2000 and higher New in SQL Server 2000 and higher is the Super Socket network library aka SSL Obtain an SSL certificate from a Certificate Authority Can enforce encryption from both the client and server sides Note: Not enabled by default! Note: SQL Server 2005 supports certificate authentication
10 Microsoft SQL Server Roles SQL Server Roles Server Roles SQL Server administration Database Roles Add/remove users Read/Write/Delete data Backup the database Application Roles For applications where you want the user to access SQL Server, but only heightened privileges when they use the app
11 Attacking SQL Server Scanning and identifying SQL Server Port Scanning 1433/tcp, 1434/udp, 2433/tcp,other dynamically assigned ports??? Information gathering SQLping Osql Gathers the TCP port of each instance by querying the SQL Server Resolution Service on 1434! Additional information such as the instance version and supported netlibs are identified Supports IP ranges Microsoft provided probing tool Only returns a list of server names and instances Not as detailed as SQLping
12 SQLRecon TCP: Port scan of TCP 1433/2433 (no auth required) is the default TCP port for SQL Server and MSDE is the default port when the "Hide server" check box is selected in the TCP/IP properties of the Server Network Utility.
13 SQLRecon
14 SQL Server Versions Database sqlsecurity.com
15 SQL Server Account Acquisition SQL Server Account Acquisition Attacks the native SQL Server authentication model SQLdict Password brute force tool forcesql Password brute force tool SQLPing v3.0 Password brute force tool with LOTS of options
16 SQL Server Common Accounts SQL Server Common Accounts sa Null/Blank by default distributor_admin Sometimes Null/Blank also Found when using replication
17 SQL Server Account Acquisition SQLdict
18 SQL Server Account Acquisition SQLPing v3.0
19 SQL Server Hashing SQL Server Hashing SQL Server passwords are hashed Sniff the network to obtain SQL traffic (non-ssl of course!) Gain access to the machine and steal the hashes Decrypting these the hard way:
20 SQL Server Exploits SQL Server Types of Exploits Brute Force attacks against SQL Server passwords Buffer Overflows Denial of Service Privilege Escalation Stored Procedure Vulnerabilities Others
21 SQL Server Global Variables SQL Server Global Variables for Enumeration SELECT name> GO SQL Server Service Pack and Version Note: must convert to Hex to reveal version name of running service name of server current process server ID A comprehensive list of version numbers
22 SQL Server Stored Procedures SQL Server Stored Procedures for Enumerating sp_configure Returns internal database settings sp_helpextendedproc Returns list of all extended stored procedures sp_spacedused Returns database names, size, and unallocated space sp_who, sp_who2 Displays usernames and the hosts their connected from, etc sp_columns <table> Returns the column names of table
23 SQL Server Ext Stored Procedures SQL Server Extended Stored Procedures Xp_cmdshell Executes a native operating system common on the host system Xp_cmdshell <command> Xp_enumgroups Displays groups for a specificed Windows NT Domain Xp_enumgroups <domain name>
24 SQL Server Ext Stored Procedures Privilege escalation with xp_cmdshell stored procedure Executes a command as an operating system command shell and returns the output EXEC master.dbo.xp_cmdshell dir c:\*.* Same as doing a dir at the DOS prompt!!! Executes a native operating system common on the host system The possibilities are endless
25 SQL Server Ext Stored Procedures Privilege escalation with xp_cmdshell stored procedure Adding a Windows account joe with a password of hacker Xp_cmdshell net user <username> <password> /ADD Xp_cmdshell net user joe hacker /ADD Adding a joe to the administrators group! Xp_cmdshell net localgroup /ADD Administrators <username> Xp_cmdshell net localgroup /ADD Administrators joe
26 SQL Server Security Countermeasures SQL Server Security Countermeasures Patch, Patch, Patch!!! Set strong passwords for all accounts, especially sa Configure firewall to block access to ports 1433, 2433, & 1434 Remove unnecessary log files that may contain sa password Install net-lib support drivers on the server and client side Encrypt communications via SSL Steps on next slide
27 SQL Server Security Countermeasures Encrypt SQL Server Communications (Enable SSL 2000 and higher) Install MCS on a server somewhere (myserver) Log onto SQL box as administrator Navigate Click Request a certificate Click Advanced Request Click Submit a certificate request to this CA using a form Fill in all fields (use DNS name for name and spell out state name) (see next page) Click Use local machine Store and submit Click Install this certificate Load Server Network Utility and select Force Protocol Encryption
28 SQL Server Security Countermeasures Encrypt SQL Server Communications (Enable SSL) If the client does not trust the CA then the client will not be able to connect Have the client navigate to and click Retrieve the CA certificate or certificate revocation list Click Download CA certificate Open the certificate, click Install Certificate and install it in the Trusted Root Certificate Store (Do not trust the certificate wizard to automatically place it in the right place manually place the certificate)
29 SQL Server Security Whitepapers and Sites SQLSecurity.com Hammer of GOD RFP SQL Magazine SQL Server Security Checklist
30 SQL Server Security References Special Ops, by Eric Pace Birkholz The Database Hacker s Handbook, David Litchfield, 2005 SQL Server Security, Chip Andrews, 2003 BlackHat Briefings SQLSecurity.com Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase by Ron Ben Natan
31 Oracle - Common Oracle Ports Oracle Listener 1521 (default) Alternate ports ( security thru obscurity ) Oracle HTTP Server 7777 (varies with 9i and up, use your port scanner to find), 4443 (SSL) Oracle XDB (XML DB) 8080 (HTTP) 2100 (FTP) Enterprise Manager 1810, 3340 (Reporting) Many others Detailed list at:
32 Enumeration - Tools Tnsping.exe Included with Oracle Client Confirms the listener is up and running, DB status unknown TNS (Transparent Network Substrate) Listener responsible for establishing and maintaining remote connections Tnscmd Tnscmd gathers TNS listener information Cqure OraclePWGuess dictionary attack tool OracleQuery sql query tool NGSSQuirrel for Oracle Oracle Database Server vulnerability scanner OraScan Audits Oracle Web Application Servers and Internet Content
33 Enumeration - TNSPing Tnsping.exe
34 Enumeration - TNScmd Tnscmd.pl (Perl) Oracle Version Number (VSNNUM) = 0x =
35 Enumeration - TNScmd Tnscmd.pl also reveals the SID = spy Tnscmd.pl also reveals the installation directory and other sensitive Oracle configuration information
36 Enumeration Many default web pages can be used to enumerate server information Reveals Oracle installation directory Reveals Apache installation directory Reveals Operating System installation directory Reveals system ports Other sensitive information
37 Enumeration
38 Enumeration Global Gateway Settings - This is the PL/SQL Gateway for configuration Database Access Descriptors that specify how the PL/SQL Gateway connects to a database server to fulfill an HTTP request. This could allow a malicious user to Add, Delete, or Modify Database Access Descriptor settings: Oracle Connection settings Authentication Mode File upload parameters And more
39 Enumeration
40 Enumeration
41 Enumeration Oracle Ent Mgr Port 3340
42 Enumeration Results The Enumeration results provide: IP address Open Oracle ports Database version SIDs (system identifier) Operating system path to database Oracle Application Server and Apache web server info Additional information
43 Exploitation Default Accounts Known Oracle default accounts (username/password) Standard Accounts SYS/CHANGE_ON_INSTALL Administrative User SYSTEM/MANAGER Administrative User SCOTT/TIGER Normal Oracle database user, he does not have the ability to stop/start the database Other Oracle accounts commonly found with default passwords: MDSYS/MDSYS DBSNMP/DBSNMP OUTLN/OUTLN A full list with over 60 accounts can be found at
44 Exploitation Finding weak accounts Oracle Password Guesser
45 Exploitation Finding weak accounts Oracle Password Guesser
46 Exploitation Oracle Client Obtaining the Oracle client Will allow you to connect to the Oracle Listener. The Oracle client is available from the Oracle site, 11g, etc. Oracle 9.X client recommended for 9.X and 8.X Oracle 8.X client required for 7.X database Provides command line and GUI. (I prefer command line, therefore the remainder of this presentation will detail the steps using the command line interface.)
47 Exploitation tnsnames.ora Configuring tnsnames.ora When you install the client, you will receive a default tnsnames.ora, this is required for connecting to the DB. Think of it as a hosts file in UNIX or Linux. prod.res = (DESCRIPTION = (ADDRESS = (PROTOCOL = TCP)(Host = )(Port = 1521)) (CONNECT_DATA = (SID = RES))) prod.odp = (DESCRIPTION = (ADDRESS = (PROTOCOL = TCP)(HOST = bogus)(port = 1524)) (CONNECT_DATA = (SERVICE_NAME = ODP))) Use the IP address and port number discovered during scanning phase. SID/Service_Name = database name
48 Exploitation - Oracle Connecting to the Oracle Listener and enumerating default user accounts: The syntax for connecting to the database is as follows: C:\oracle\ora90\bin> sqlplus username/password@databasename Remember that this database name is related to the name in the tnsnames.ora file created earlier.
49 Exploitation - Oracle The scott/tiger user account can be used to list other valid accounts on the machine as well!
50 Exploitation - Oracle More times than not, at least one customer-defined user account has the password same as the username. So by enumerating all of the valid user accounts, we can perhaps identify other weak user accounts as well. We ve enumerated the common system accounts, as well as an account named DC
51 Exploitation - Oracle We have now effectively escalated our access. This allowed SYSDBA access to the database, thus allowing enumeration of the password file.
52 Exploitation - Oracle Oracle has never published what algorithm is used to generate their password hashes, but it appears that no salt is used seeing as Oracle hash lists are published revealing hashes and their associated passwords. The account allows us full access to the database, including the ability to stop, start, and even modify the database!
53 Oracle passwords UPDATE!!! Oct. 15, 2005 Two researchers (Jashua Wright and Carlos Cid) identified weaknesses in the Oracle hashing mechanism for protecting the passwords Weak SALT (uses username for SALT) Lack of case preservation (Oracle passwords are case insensitive; PASSWORD is the same as password ) associated passwords. Weak algorithm See:
54 Oracle passwords still yet another update Oracle Password Algorithm (7-10g Rel.2) Up to 30 characters long. All characters will be converted to uppercase before the hashing starts 8-byte hash, encrypted with a DES encryption algorithm without real salt (just the username). The algorithm can be found in the book "Special Ops Host And Network Security For Microsoft, Unix, And Oracle Oracle database 11g offers the (optional) possibility to use passwords up to 50 characters (uppercase/lowercase). In Oracle 11g the passwords are now hashed with DES (column: password) AND using SHA-1 (column: spare4). The SHA-1 passwords are now supporting mixed-case passwords. In 11g the password hashes are no longer available in dba_users. Oracle (7-10g R2) encrypts the concatenation of (username password) --- sys/temp1 and system/p1 have the identical hashkey (2E B5B9B7A) Oracle (11g R1) uses SHA-1 to hash the concatenation of (password salt)
55 Exploitation - Oracle Other commands List tablespaces and status SQL> Select * from dba_data_files; Display current parameter values SQL> SHOW PARAMETER control Show database free space SQL> Select * from dba_free_space;
56 Exploitation Oracle CIS Benchmark Tool Cisecurity.org
57 Exploitation - Oracle Further exploitation would be non-ethical and DANGEROUS! Anything more, and we could risk accidentally damaging their database. We ve effectively proven our point. A small window of compromise, allowed a huge window of access. Presenting a customer with the usernames and passwords Presenting a customer with the usernames and passwords hashes from their Oracle database will certainly catch their attention.
58 Securing Oracle Remediation Steps Set strong passwords for all accounts! Setting a new strong password Login to database and set password: SQL> alter user <username> identified by <newpassword>; User altered. SQL>
59 Securing Oracle Remediation Steps Securing the Listener Configure Listener to accept/refuse requests from specific IPs Create a file called protocol.ora in same directory as listener.ora (typically $ORACLE_HOME/network/admin) Contents of protocol.ora file: tcp.validnode_checking=yes tcp.invited_nodes=(address1, address2, ) tcp.excluded_nodes=(address1, address2, ) Note: can be IPs or hostnames (sorry ranges not allowed) Don t forget to restart listener!
60 Securing Oracle Remediation Steps Securing the Listener by restricting access Set a password for the Listener Login to listener controller C:\lsnrctl Set the password LSNRCTL> SET PASSWORD <password> Alternatively setting the Listener password Set the password LSNRCTL> CHANGE_PASSWORD Old password: <enter> New password: <new password> Reenter new password: <new password> LSNRCTL> SAVE_CONFIG
61 Securing Oracle Remediation Steps Disable the ability to change TNS Listener configuration settings Edit listener.ora and add or modify: ADMIN_RESTRICTIONS_<listener_name>=ON
62 Securing Oracle Remediation Steps Enable Logging By default, logging is disabled, to enable it: LSNRCTL> SET LOG_STATUS on Connecting to (DESCRIPTION=(ADDRESS=(PROTOCOL=TCP)(HOS T= spy)(port=1521))) listener parameter "log_status" set to ON The command completed successfully View log of listener commands (issued locally and remotely): View the file <SID>.log in the $ORACLE_HOME/network/admin Will show the timestamp, command issued, and result code
63 Securing Oracle Remediation Steps Remove unnecessary URLs Remove or disable unnecessary accounts Encrypt your communications through use of SSH Audit your database through operating system and database logging Locate your publicly accessible Oracle web server behind a firewall in a DMZ, and separately install the Oracle database server on the internal network No Oracle database should be in a DMZ or unprotected by a firewall!!!
64 Securing Oracle Whitepapers and Sites Download and incorporate the Oracle Security checklist pdf Oracle 11g hardening info: Other great sites: Pentest Limited NGSSoftware Pete Finnigan Many links to Oracle Security whitepapers on this site!
65 References Securing Oracle Network Traffic, Robert Schrag, Oracle Security Papers, Peter Finnigan, Hackproofing Oracle Application Server, David Litchfield, Hackproofing Oracle Databases, Aaron Newman, Oracle Auditing Tool, Patrik Karlsson, CIS Benchmark Tool -
66 Other Databases - MySQL MySQL Most popular Open Source Database Common in many development and/or open source environments Commonly found on dba desktops Typically contain a copy of production and test data Many time contain default configurations
67 Other Databases - MySQL MySQL Default listener port 3306/tcp Client free from site Default database login Login: root Password: <no password!!!> ~/.mysql_history file stores a history of all SQL commands including passwords!
68 Other Databases - MySQL MySQL Additional Inf Mysql Security Handbook, by Wrox Author Team MySQL Bible, by Steve Suehring Securing MySQL: step-by-step
69 Other Databases DB2 DB2 Runs on Windows, Linux, UNIX Default Listener Port 523/tcp Default database logins db2admin/db2admin db2as/ibmdb2 dlfm/ibmdb2 db2inst1/ibmdb2 db2fenc1/ibmdb2 Default log db2diag.log can reveal sensitive information
70 Other Databases DB2 DB2 Addition info Securing IBM DB2 DB2.pdf DB2 Installation and Security
71 Q&A Thank You 71 C O M P A N Y C O N F I D E N T I A L
Database Penetration Testing Atlanta OWASP Chapter Meeting 4/21/2011 Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI
Database Penetration Testing Atlanta OWASP Chapter Meeting 4/21/2011 Michael Raggo, CISSP, NSA-IAM, CCSI, SCSA, ACE, CSI Friday, April 22, 2011 Objectives The objective of this session is to familiarize
Microsoft SQL Server Security Best Practices
Microsoft SQL Server Security Best Practices This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL Server.
Different ways to guess Oracle database SID
30 October 2008 Different ways to guess Oracle database SID Digitаl Security Research Group (DSecRG) Alexander Polyakov [email protected] http://dsecrg.ru Content Introduction...3 A brief info about SID
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques.
Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques. In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
Need for Database Security. Whitepaper
Whitepaper 2 Introduction The common factor in today s global economy where most of the business is done electronically via B2B [Business to Business] or via B2C [business to consumer] or other more traditional
NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a
NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a: WIN- 2LR8M18J6A1 On WIN-2LR8M18J6A1 - By admin for time period 6/10/2014 8:59:44 AM to 6/10/2014 8:59:44 AM NNT CIS Microsoft
Oracle Security Auditing
Introduction - Commercial Slide. RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 Founded February 2003 CEO Pete Finnigan Clients UK,
Oracle Security Auditing
RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 1 Introduction - Commercial Slide. Founded February 2003 CEO Pete Finnigan Clients
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
BLIND SQL INJECTION (UBC)
WaveFront Consulting Group BLIND SQL INJECTION (UBC) Rui Pereira,B.Sc.(Hons),CISSP,CIPS ISP,CISA,CWNA,CPTS/CPTE WaveFront Consulting Group Ltd [email protected] www.wavefrontcg.com 1 This material
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Configuring an Alternative Database for SAS Web Infrastructure Platform Services
Configuration Guide Configuring an Alternative Database for SAS Web Infrastructure Platform Services By default, SAS Web Infrastructure Platform Services is configured to use SAS Framework Data Server.
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
PowerChute TM Network Shutdown Security Features & Deployment
PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Oracle Security Tools
Introduction - Commercial Slide. UKOUG Conference, December 7 th 2007 Oracle Security Tools By Pete Finnigan Written Friday, 19 th October 2007 Founded February 2003 CEO Pete Finnigan Clients UK, States,
Database Assessment. Vulnerability Assessment Course
Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Introduction Configuration
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
SQL Server Hardening
Considerations, page 1 SQL Server 2008 R2 Security Considerations, page 4 Considerations Top SQL Hardening Considerations Top SQL Hardening considerations: 1 Do not install SQL Server on an Active Directory
ecopy ShareScan v4.3 Pre-Installation Checklist
ecopy ShareScan v4.3 Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication section describes
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Use of Commercial Backup Software with Juris (Juris 2.x w/msde)
Use of Commercial Backup Software with Juris (Juris 2.x w/msde) Juris databases hosted on a Microsoft SQL Server 2000 Desktop Engine (MSDE) instance can be backed up manually through the Juris Management
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Penetration: from Application down to OS
April 13, 2010 Penetration: from Application down to OS Getting OS Access Using Lotus Domino Application Server Vulnerabilities Digitаl Security Research Group (DSecRG) www.dsecrg.com Alexandr Polyakov.
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
PUBLIC Installation: SAP Mobile Platform Server for Linux
SAP Mobile Platform 3.0 SP11 Document Version: 1.0 2016-06-09 PUBLIC Content 1.... 4 2 Planning the Landscape....5 2.1 Installation Worksheets....6 3 Installing SAP Mobile Platform Server....9 3.1 Acquiring
SECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Plesk 11 Manual. Fasthosts Customer Support
Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Improved Penetration Testing of Web Apps and Databases with MatriXay
Improved Penetration Testing of Web Apps and Databases with MatriXay Yuan Fan GCIH,GCIA,CISSP [email protected] Xiao Rong CISSP,ITIL [email protected] Background Database Portion Overview
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
4. Getting started: Performing an audit
4. Getting started: Performing an audit Introduction Security scans enable systems administrators to identify and assess possible risks within a network. Through GFI LANguard N.S.S. this is performed automatically,
Configuring and Monitoring Database Servers
Configuring and Monitoring Database Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
Policy Compliance. Getting Started Guide. January 22, 2016
Policy Compliance Getting Started Guide January 22, 2016 Copyright 2011-2016 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
Installation Guide. Release 3.1
Installation Guide Release 3.1 Publication number: 613P10303; September 2003 Copyright 2002-2003 Xerox Corporation. All Rights Reserverved. Xerox, The Document Company, the digital X and DocuShare are
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting
Violating The Corporate Database. Presented by Dan Cornforth Brightstar, IT Security Summit, April 2006
Violating The Corporate Database Presented by Dan Cornforth Brightstar, IT Security Summit, April 2006 Copyright Security-Assessment.com 2005 Disclaimer: This presentation aims to focus on some of the
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
VMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Management, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
Penetration Testing: Advanced Oracle Exploitation Page 1
Penetration Testing: Advanced Oracle Exploitation Page 1 Course Index:: Day 1 Oracle RDBMS and the Oracle Network Architecture... 3» Introduction and Oracle Review...3» Service Information Enumeration:...3»
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
Enterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Securing Your Network. The Art of Attack & Penetration
Securing Your Network The Art of Attack & Penetration Erik Pace Birkholz Special Ops Security Eric Schultze Shavlik Technologies Session Objectives Discuss common DMZ and host configuration weaknesses
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more Security Review Version 8.1 March 31, 2016 Contacting Leostream Leostream Corporation http://www.leostream.com
Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements
Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise
Database Security Guide
Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document
Connection Broker Managing User Connections to Workstations, Blades, VDI, and more. Security Review
Connection Broker Managing User Connections to Workstations, Blades, VDI, and more Security Review Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com 465 Waverley
ilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
Xerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
NetSupport DNA Configuration of Microsoft SQL Server Express
NetSupport DNA Configuration of Microsoft SQL Server Express Configuration of Microsoft SQL Server Express and NetSupport DNA Installation Requirements If installing Microsoft SQL Server Express on Windows
Installation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
Getting Started with RES ONE Automation 2015
Getting Started with RES ONE Automation 2015 Disclaimer Whilst every care has been taken by RES Software to ensure that the information contained in this document is correct and complete, it is possible
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: rsync.net ASV Company: Comodo CA Limited 06-02-2015 Scan expiration date: 08-31-2015 Part 2. Component
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1. Revision Date: July 2011
HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1 Revision Date: July 2011 Summary of Contents Summary of Contents... 2 Pre Installation Checklist... 4 Prerequisites...
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
