Top 10 Database. Misconfigurations.

Size: px
Start display at page:

Download "Top 10 Database. Misconfigurations. [email protected]"

Transcription

1 Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad

2 Some Newsworthy Breaches From

3 In Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage Databases continue to be the primary target Same old attack vectors continue to yield success SQL injection here to stay? New attacks emerge Costs associated with data breaches continues to rise 3

4 Database Risks for 2012 Organizations have long focused their security efforts on the perimeter and endpoints This approach has left the data center highly vulnerable to anyone who can gain access via: 1. SQL Injection 2. Spear Phishing 3. Malware / Drive by downloads 4. Advanced Persistent Threats 5. Insider Attacks / Mistakes 6. Social Engineering 4

5 Data Breach Costs Are On The Rise $214 Over 535 million DBMS records have $204 $202 been compromised since 2008 $197 Cost per record estimated at $214- $318 for 2010 Annual losses valued at over $388 Billion $7.2 Million is the average cost of a data breach $ Cost Per Exposed Record Sources: Ponemon Institute, Symantic/Norton, Verizon Business Data Breach Report 5

6 Database Risks for 2012 Full of Holes Team SHATTER and others keep finding high risk vulnerabilities for database vendors to patch Exploit scripts posted to the web within hours of every patch release Fully patched but misconfigured databases are another easy target Database attacks bypass traditional network and host intrusion prevention mechanisms Public exploit code + slow patch cycle = High risk DBMS exposure 6

7 Already in Million Accounts 2 Fixes (only 5 in Oct 2011) 7

8 Top 10 DB Vulnerabilities and Misconfigurations 8

9 DB1: Default and Weak Passwords Default accounts are never good Not only DBMS have own default accounts, but applications install them too Weak passwords can be cracked Just google <database type> password cracker dozens of them out there Names, places, dictionary words make poor passwords Rainbow tables make anything under 7 or 8 characters weak Database login activity seldom monitored If you re not watching, an attacker can guess passwords all day 9

10 Default Account Examples User: system / Password: manager User: sys / Password: change_on_install User: scott / Password: tiger User: SA / Password: null User: db2admin / Password: db2admin User: db2as / Password: ibmdb2 User: SA / Password: null User: root / Password: null User: admin / Password: admin User: myusername / Password: mypassword User/Password the Same: DATABASE SECURITY DBSNMP NOT MY PROBLEM 10

11 Top 10 DB Vulnerabilities and Misconfigurations 11

12 DB2: SQL Injection in the DBMS Same concept as at Web App Specific functions in the DBMS are vulnerable to SQL injection Patching is needed for the fix Since the weaknesses are in the DBMS itself, vendor patches are required to remediate Typically takes 6+ months to patch a database 12

13 Exploiting SQL Injection Attack Target: Oracle 11g Privilege Level: Any Login with CREATE PROCEDURE Outcome: Access to all Database Data! Attacker can run any SQL as WMSYS Vulnerabilities Exploited: Privilege Escalation via SQL Injection in [WM]SYS.LT.ROLLBACKWORKSPACE 13

14 14

15 15

16 16

17 Top 10 DB Vulnerabilities and Misconfigurations 17

18 DB3: Excessive User & Group Privileges Theory of least privilege Great in theory; hard in practice Entitlements hard to manage Users can gain access by way of a role that is granted another role that is granted another role Often default database privilege grants are excessive and dangerous 18

19 How Did the User Get The Privilege? User Role Role Role Role Role 19

20 Exploiting Excessive Privileges Attack Target: Oracle 11g Release 1 Privilege Level: Anyone with CREATE SESSION privilege Outcome: Gain DBA access & complete OS control Vulnerabilities Exploited: Default PUBLIC privilege to execute DBMS_JVM_EXP_PERMS.IMPORT_JVM_PER PERMS PER MS 20

21 No users have ALL FILES - full OS access Attempt to execute OS command fails 21

22 Setup the JVM access control policy The attack in action. PUBLIC can import JVM permissions! 22

23 USER1 has full OS access OS commands run successfully New OS file created by our exploit 23

24 Freely Available Exploit Code! 24

25 Top 10 DB Vulnerabilities and Misconfigurations 25

26 DB4: Unnecessary Enabled DBMS Features Minimize Attack Surface Attackers will only have more to use against you Powerful Features are Good and Bad Integrated Java and other extensible languages Various levels of OS access available 26

27 Minimize Attack Surface Java UTL_FILE xp_cmdshell CREATE _ NOT _ FENCED (allows logins to create SPs) OLEDB Ad Hoc Query OPENROWSET OPENDATASOURCE xp_cmdshell Permissions on User Table (mysql.user) 27

28 Top 10 DB Vulnerabilities and Misconfigurations 28

29 DB5: Broken Configuration Management Configuration Option Overload Beginning Name the instance, choose the data storage location Now Advanced feature sets, add-on modules, specific security settings, etc. What s the right configuration? 1 st What is our current configuration? 2 nd What should be our configuration? 29

30 Misconfigurations Are Potential Threats Oracle Configuration Management (OCM) stores configuration data about sysaudits table If properly hostnames, usernames, datafile configured audit records can be lost locations, etc. TRUST_ALLCLNTS configuration parameter If set to default (which is YES) all clients attempting to connect will be considered trusted Default TCP Ports 1433 and

31 Top 10 DB Vulnerabilities and Misconfigurations 31

32 DB6: Buffer Overflows Crash or Exploit Simple: crash the server Advanced: load and run malicious code Only a vendor patch fixes the issue Like a SQL Injection vulnerability Need vendor fix 32

33 Example: Attacking DB2: Denial of Service Attack Target: IBM DB2 LUW 9.1 Fix Pack 8 Privilege Level: Any database user Outcome: Crash database server Vulnerabilities Exploited: Heap buffer overflow in built-in scalar function REPEAT Patched by Database Vendor: IBM DB2 LUW 9.1 Fix Pack 9 33

34 Connect to the database Run the exploit. No privileges needed! 34

35 No more database. 35

36 Freely Available Exploit Code 36

37 Top 10 DB Vulnerabilities and Misconfigurations 37

38 DB7: Privilege Escalation I am now DBA Vulnerabilities can lead to low- privileged users becoming DBA Only a vendor patch fixes the issue Risk management when considering patch rollout 38

39 Exploiting Privilege Escalation Attack Target: Oracle11g Release 2 Pi Privilege il Level: CREATE PROCEDURE and EXEC on MDSYS.RESET_INPROG_INDEX Outcome: Full control of the database (assume DBA role) Vulnerabilities Exploited: Privilege escalation in MDSYS.RESET_INPROG_INDEX Patched by Database Vendor: Oracle January 2011 CPU 39

40 The Attack Step by Step 1. Setup a) Create procedure myproc containing code to grant my account DBA b) Create function myfn containing code to create a trigger in the system schema 2. Exploit a) Exploit the vulnerability, causing MDSYS to run myfn. Creates the trigger. 3. Reap Rewards a) Use PUBLIC privileges to run a SQL statement that causes the trigger to fire. System runs the trigger, which calls myproc which grants my account DBA. 40

41 Create a new user (user1) and grant privileges. 41

42 Setup step 1: Create attack code (myproc) to grant DBA privileges to user1 42

43 Setup Step 2: Create a function (myfn) that creates an evil trigger that calls the attack code (myproc) 43

44 Run the exploit. Causes MDSYS to run myfn and create the evil trigger. Insert statement causes the evil trigger to run myproc and grants DBA 44

45 Attacker is now DBA 45

46 Google Told Me All About It.. 46

47 Top 10 DB Vulnerabilities and Misconfigurations 47

48 DB8: DoS Remember the SQL Slammer Worm? 75,000 victims in 10 minutes Microsoft had the patch 6 months prior Again, patch management for DBMS is crucial 48

49 Exploiting Denial of Service Attack Target: IBM DB2 LUW 9.7 Fix Pack 1 Privilege Level: Anyone on the network Outcome: No access to DB2 database Vulnerabilities Exploited: Denial of Service in the Tivoli DB2 monitoring agent Patched by Database Vendor: IBM DB2 LUW 9.7 Fix Pack 2 49

50 DB2 Monitoring Agent has crashed. Run the exploit. No database login needed! 50

51 Attacking DB2: Denial of Service Outcome: DB2 9.7 Database is unavailable Vulnerabilities Exploited: DoS in the Tivoli DB2 monitoring agent How Did We Do It? Freely available exploit code Google: KUDDB2 remote denial of service 51

52 Top 10 DB Vulnerabilities and Misconfigurations 52

53 DB9: Unpatched Database Vulnerable the day the patch is released Exploit/POC code emerges quickly What s the difference compared to a zero-day vulnerabilities? What do we patch first? Citi Critical lbusiness systems??low risk systems? 53

54 Top 10 DB Vulnerabilities and Misconfigurations 54

55 DB10: Unencrypted Data At Rest and In Motion Data at Rest File system encryption Transparent Data Encryption (TDE) Data In Motion SSL Oracle ASO Kerberos 55

56 Top 10 DB Vulnerabilities and Misconfigurations 56

57 DB11: Not Doing Anything Reliance on Perimeter Protection Only Does Not Work Sony, Epsilon etc. Who s responsible for DB Security? Who are the stakeholders? DBA? Security? 57

58 Database Security Tips for Devise a Database Security Plan 2. Locate Sensitive e Information 3. Minimize Attack Surface 4. Fix Default, Blank and Weak Passwords 5. Regularly Patch Databases 6. Implement Least Privileges 7. Encrypt Sensitive Data in Rest and in Motion 8. Train and Enforce Corporate Best Practices 58

59 Database Security Tips for 2012 Devise a Database Security Plan Start with an established DBMS checklist DISA STIG is an excellent starting point DISA publishes detailed guidelines on how to secure and configure MS SQL server and Oracle Customize to meet your orgs needs. There may be industry regulations to follow PCI, SOX, HIPAA Once a DBMS security policy is established, build a roll-out out plan Pick one or two of the highest priority issues to remediate first As you progress, layer on additional checks and tests 59

60 Database Security Tips for 2012 Locate Sensitive Information Determine where all sensitive info resides Secure those databases first Minimize Attack Surface The DBMS ships with many features that are not used Some of these features have functionality that render a DBMS vulnerable to attack Where possible, disable unused DBMS features 60

61 Database Security Tips for 2012 Fix Default, Blank and Weak Passwords Ensure all databases require complex passwords Eliminate default, blank and weak passwords Use different passwords for each system External authentication systems can be a great option Regularly Patch Databases Critical patches insure that vulnerabilities are remediated on a regular basis Patching in conjunction with auditing and monitoring increases DBMS protection 61

62 Database Security Tips for 2012 Implement Least Privileges Ensure employees only have access to the sensitive data required to do their jobs Map job functions to privileges on IT assets Never assign privileges il to guest accounts or PUBLIC Untangle the web of user entitlements Encrypt Sensitive Data at Rest and in Motion Never er store sensitive e data in clear text t in a DBMS where any DBA/IT staff can access it Ensure the data is encrypted and not allowed to travel unencrypted on the network 62

63 Database Security Tips for 2012 Train and Enforce Corporate Security Best Practices Ensure all employees are aware of the orgs. security best practices Create a training i program and consistently reinforce policy Extend critical protections at the network and application layer to the DBMS Perform regular DBMS audits, pen tests and misconfiguration checks Activity monitoring to ensure sensitive data is not downloaded or transferred 63

64 Last Thoughts Attackers are targeting the data center, your defenses should be focused there Most breaches in 2011 were simple attacks that exploited common flaws or the result of human error/failure Almost all were avoidable through simple controls In 2012, improve security AND improve education (re-educate) security and non- security professionals 64

65 References Team SHATTER Top 10 Database Vulnerabilities Book Security Heuristics of Application Testing Technology for Enterprise Research Practical Oracle Security By Josh Shaul CTO, Application Security, Inc. Mark Trinidad Sr. Product Manager Application Security, Inc blog.appsecinc.com 65

Database Security and Auditing: Leading Practices. Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc.

Database Security and Auditing: Leading Practices. Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc. Database Security and Auditing: Leading Practices Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc. Getting to Know Database Threats and Vulnerabilities Key Objectives Understand

More information

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations rbarnes@appsecinc.com Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised

More information

Database Security & Auditing

Database Security & Auditing Database Security & Auditing Jeff Paddock Manager, Enterprise Solutions September 17, 2009 1 Verizon 2009 Data Breach Investigations Report: 285 million records were compromised in 2008 2 Agenda The Threat

More information

Anatomy of a Database Attack

Anatomy of a Database Attack Anatomy of a Database Attack James Bleecker Application Security, Inc. Principal Systems Engineer June 9, 2011 Scott Campbell Application Security, Inc Regional Sales Manager Today s Agenda The Threat

More information

Hacking databases for owning your data. Cesar Cerrudo Esteban Martinez Fayo Argeniss (www.argeniss.com)

Hacking databases for owning your data. Cesar Cerrudo Esteban Martinez Fayo Argeniss (www.argeniss.com) Hacking databases for owning your data Cesar Cerrudo Esteban Martinez Fayo Argeniss (www.argeniss.com) Overview Introduction Why database security? How databases are hacked? Oracle Database Server attacks

More information

Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015

Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015 Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Agenda How and Why Prevention Q&A 1 2 3 4 5 Targeted Attack Detection

More information

Oracle Database Security Myths

Oracle Database Security Myths Oracle Database Security Myths December 13, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation About Integrigy ERP Applications

More information

Hacking Database for Owning your Data

Hacking Database for Owning your Data Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money

More information

Oracle Security Auditing

Oracle Security Auditing Introduction - Commercial Slide. RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 Founded February 2003 CEO Pete Finnigan Clients UK,

More information

Oracle Security Auditing

Oracle Security Auditing RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 1 Introduction - Commercial Slide. Founded February 2003 CEO Pete Finnigan Clients

More information

Securing Database Servers. Database security for enterprise information systems and security professionals

Securing Database Servers. Database security for enterprise information systems and security professionals Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,

More information

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

How to Audit the Top Ten E-Business Suite Security Risks

How to Audit the Top Ten E-Business Suite Security Risks In-Source Your IT Audit Series How to Audit the Top Ten E-Business Suite Security Risks February 28, 2012 Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost

More information

Defending the Database Techniques and best practices

Defending the Database Techniques and best practices ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target

More information

Microsoft SQL Server Security Best Practices

Microsoft SQL Server Security Best Practices Microsoft SQL Server Security Best Practices This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL Server.

More information

Hack Your SQL Server Database Before the Hackers Do

Hack Your SQL Server Database Before the Hackers Do Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Manipulating Microsoft SQL Server Using SQL Injection

Manipulating Microsoft SQL Server Using SQL Injection Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION

More information

Discovering passwords in the memory

Discovering passwords in the memory Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability

More information

Implementing Database Security and Auditing

Implementing Database Security and Auditing Implementing Database Security and Auditing A guide for DBAs, information security administrators and auditors Ron Ben Natan ELSEVIER DIGITAL PRESS Amsterdam Boston Heidelberg London New York Oxford P

More information

Security Solution Architecture for VDI

Security Solution Architecture for VDI Solution Architecture for VDI A reference implementation of VMware BENEFITS Validated solution architecture provides unprecedented end-to-end security dashboard for virtual desktop infrastructure (VDI)

More information

Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques.

Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques. Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques. In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm

More information

Introduction to IT Security

Introduction to IT Security Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 30 November 2015 Marek Rychly ES, 30 November

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort

More information

Web Application Penetration Testing

Web Application Penetration Testing Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]

More information

Security and Control Issues within Relational Databases

Security and Control Issues within Relational Databases Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats

More information

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Barracuda Web Site Firewall Ensures PCI DSS Compliance Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online

More information

Database Assessment. Vulnerability Assessment Course

Database Assessment. Vulnerability Assessment Course Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Introduction Configuration

More information

Top Ten Database Security Threats

Top Ten Database Security Threats How to Mitigate the Most Significant Database Vulnerabilities Written by: Amichai Shulman Co-founder, CTO The enterprise database infrastructure is subject to an overwhelming range of threats. This document

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

McAfee Database Security. Dan Sarel, VP Database Security Products

McAfee Database Security. Dan Sarel, VP Database Security Products McAfee Database Security Dan Sarel, VP Database Security Products Agenda Databases why are they so frail and why most customers Do very little about it? Databases more about the security problem Introducing

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

Columbia University Web Security Standards and Practices. Objective and Scope

Columbia University Web Security Standards and Practices. Objective and Scope Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements

More information

Secure Web Applications. The front line defense

Secure Web Applications. The front line defense Secure Web Applications The front line defense Agenda Web Application Security Threat Overview Exploiting Web Applications Common Attacks & Preventative techniques Developing Secure Web Applications -Security

More information

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons

More information

What is Web Security? Motivation

What is Web Security? Motivation [email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

Top Ten Fraud Risks in the Oracle E Business Suite

Top Ten Fraud Risks in the Oracle E Business Suite Top Ten Fraud Risks in the Oracle E Business Suite Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost Chief Technology Officer Integrigy Corporation February

More information

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org

More information

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

Penetration Testing: Advanced Oracle Exploitation Page 1

Penetration Testing: Advanced Oracle Exploitation Page 1 Penetration Testing: Advanced Oracle Exploitation Page 1 Course Index:: Day 1 Oracle RDBMS and the Oracle Network Architecture... 3» Introduction and Oracle Review...3» Service Information Enumeration:...3»

More information

Database Security Guide

Database Security Guide Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a

NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a: WIN- 2LR8M18J6A1 On WIN-2LR8M18J6A1 - By admin for time period 6/10/2014 8:59:44 AM to 6/10/2014 8:59:44 AM NNT CIS Microsoft

More information

Need for Database Security. Whitepaper

Need for Database Security. Whitepaper Whitepaper 2 Introduction The common factor in today s global economy where most of the business is done electronically via B2B [Business to Business] or via B2C [business to consumer] or other more traditional

More information

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration

More information

Hunting flaws in Microsoft SQL Server

Hunting flaws in Microsoft SQL Server Hunting flaws in Microsoft SQL Server Cesar Cerrudo Independant Security Researcher Aaron Newman CTO/Founder, Application Security, Inc. www.appsecinc.com 1 Outline Collecting passwords Elevating privileges

More information

Database Security SQL Server 2012

Database Security SQL Server 2012 Database Security SQL Server 2012 Russ McMahon Associate Prof of Information Technology CECH UC 1 of only 21 ABET accredited programs in the US Jasmine Hix Senior IT (Software Dev) Helped with the slides

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Securing SharePoint 101. Rob Rachwald Imperva

Securing SharePoint 101. Rob Rachwald Imperva Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal

More information

Guardium Change Auditing System (CAS)

Guardium Change Auditing System (CAS) Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity

More information

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Protecting Sensitive Data Reducing Risk with Oracle Database Security Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Host/Platform Security. Module 11

Host/Platform Security. Module 11 Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic

More information

What? Me, Worry? I've Already Been Hacked. Haven't You?

What? Me, Worry? I've Already Been Hacked. Haven't You? What? Me, Worry? I've Already Been Hacked. Haven't You? David Maman Co-Founder, CTO GreenSQL Session ID: Session Classification: DSP-F43 General Interest #1 Global Security Challenge Sophisticated attacks:

More information

Rational AppScan & Ounce Products

Rational AppScan & Ounce Products IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168

More information

The Top Web Application Attacks: Are you vulnerable?

The Top Web Application Attacks: Are you vulnerable? QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

Making Database Security an IT Security Priority

Making Database Security an IT Security Priority Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases

More information

Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006

Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006 Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Data Breaches and Web Servers: The Giant Sucking Sound

Data Breaches and Web Servers: The Giant Sucking Sound Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4 Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access

More information

Network Security Audit. Vulnerability Assessment (VA)

Network Security Audit. Vulnerability Assessment (VA) Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.

More information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager

More information

GUIDE TO SYBASE SECURITY

GUIDE TO SYBASE SECURITY GUIDE TO SYBASE SECURITY [email protected] Company: Network Intelligence India Pvt. Ltd. http://www.nii.co.in Date: 31 st January 2003 Guide to Sybase Security Introduction: This article provides a detailed

More information

MySQL Security for Security Audits

MySQL Security for Security Audits MySQL Security for Security Audits Presented by, MySQL AB & O Reilly Media, Inc. Brian Miezejewski MySQL Principal Consultat Bio Leed Architect ZFour database 1986 Senior Principal Architect American Airlines

More information

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data

More information

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Guidelines for Website Security and Security Counter Measures for e-e Governance Project and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

Data-Centric Security vs. Database-Level Security

Data-Centric Security vs. Database-Level Security TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides

More information

<Insert Picture Here> Oracle Database Vault

<Insert Picture Here> Oracle Database Vault Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information

More information

Internal Penetration Test

Internal Penetration Test Internal Penetration Test Agenda Time Agenda Item 10:00 10:15 Introduction 10:15 12:15 Seminar: Web Application Penetration Test 12:15 12:30 Break 12:30 13:30 Seminar: Social Engineering Test 13:30 15:00

More information

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever Dana Tamir, Product Marketing Manager, Imperva Consider this: In the first half of 2008, SQL injection was the number one attack vector

More information

Simple Steps to Securing Your SSL VPN

Simple Steps to Securing Your SSL VPN Simple Steps to Securing Your SSL VPN A five-point strategy for secure remote access Managing secure remote access is a tough job. Because remote systems may directly connect to the Internet rather than

More information

Nixu SNS Security White Paper May 2007 Version 1.2

Nixu SNS Security White Paper May 2007 Version 1.2 1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle

More information

Hedgehog: Host-Based Database Activity Monitoring & Prevention

Hedgehog: Host-Based Database Activity Monitoring & Prevention Whitepaper Hedgehog: Host-Based Database Activity Monitoring & Prevention Including: Introduction to database security, activity monitoring and intrusion prevention Unique benefits of host-base monitoring

More information

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis

More information

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts May 15, 2014 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy

More information

OWASP Top Ten Backdoors

OWASP Top Ten Backdoors OWASP Top Ten Backdoors 1 Yaniv Simsolo, COMSEC Consulting The news about the above agreement was posted on Cisco site in mid 1998. Shortly this news was removed from Cisco website. Gradually all this

More information

Lotus Domino Security

Lotus Domino Security An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware

More information

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH zgrace@403labs.com January 17, 2014 2014 Mega Conference Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance

More information

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks r.gibala@f5.com Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week

More information