Attack Methodology Analysis: SQL Injection Attacks
|
|
|
- Arlene Bishop
- 10 years ago
- Views:
Transcription
1 INL/EXT Attack Methodology Analysis: SQL Injection Attacks Bri Rolston September 2005 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance
2 INL/EXT Attack Methodology Analysis: SQL Injection Attacks Bri Rolston September 2005 US-CERT Control Systems Security Center Idaho Falls, Idaho Prepared for the U.S. Department of Homeland Security Under DOE Idaho Operations Office Contract DE-AC07-05ID14517
3 US-CERT Control Systems Security Center Attack Methodology Analysis: SQL Injection Attacks INL/EXT September 2005
4
5 ABSTRACT Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments. iii
6 iv
7 ACKNOWLEDGMENTS This paper would not have been possible without the valuable research and analytic contributions provided by Kris Watts, University of Idaho scholar and Attack Methodology Analysis intern. v
8 vi
9 CONTENTS ABSTRACT... iii ACKNOWLEDGMENTS...v ACRONYMS... ix 1. INTRODUCTION DATABASES AND SQL UNDERSTANDING SQL INJECTION HISTORY OF SQL INJECTION FUTURE OF SQL INJECTION AS AN ATTACK METHODOLOGY...7 vii
10 viii
11 ACRONYMS AMA COTS CS DBMS RDBMS SQL XML Attack Methodology Analysis Commercial-Off-the Shelf Control System Database Management System Relational Data Structures Structure Query Language Extensible Markup Language ix
12 x
13 Attack Methodology Analysis: SQL Injection 1. INTRODUCTION Threats to control system To cut costs while increasing reliability and maintainability, modern control systems are using commercial off-the-shelf (COTS) applications, software development environments, and operating systems rather than the proprietary applications and protocols popular in legacy environments. From a security standpoint, this transition has both positive and negative implications for control system (CS) networks. Consolidating to a narrower scope of applications, protocols, and operating systems that are well-known and well-supported in the general Information Technology (IT) world decreases the costs of system administration; this also allows for the implementation of standardized security practices and technologies that have been popularly tested and deployed by IT security administrators. The move away from non-standard, proprietary applications and protocols to COTS software facilitates the rapid exchange of information between CS environments and companies business or financial networks, resulting in higher quality products and more competitive pricing for consumers. However, this integration of COTS software into CS networks introduces a wide range of new computer-based threats to critical infrastructure. CS security previously depended on the principle of security through obscurity. As long as each individual CS environment was highly customized and dependent on poorly documented, obscure proprietary protocols and applications, attackers required extensive knowledge of the CS network architecture, significant technical expertise, and hands-on experience with the CS application being used by the target. This is no longer the case. Exploits and attack methodology, already widely used against the COTS software on IT networks, can be readily used or ported over for use against CS environments. This significantly eases the complexity of performing cyber attacks against control systems. The new level of threat faced by critical infrastructure is compounded by the move to incorporate communications primarily from the CS databases into organizations business or financial networks, which in turn are connected to the public Internet. Now, overwhelming numbers of exploits exist for key components of CS networks and the vulnerabilities can be accessed via the web. Proprietary application formats and obscure protocols no longer provide control systems with sufficient protection against cyber attacks. New threats to critical infrastructure computers must be identified as quickly as possible to ensure defenses can be tested and deployed rapidly and effectively. Databases used by control systems to store valuable data are often connected to databases or computers with web-enabled applications located on the business network. Virtually every data-driven application has transitioned to some form of database, and Structured Query Language (SQL) is the language used to query most of those databases. 1
14 Impact of SQL injection on control systems The important information contained in these CS databases makes them high-value targets to attackers. By connecting CS databases to business or financial databases or computers with applications used to access the data, attackers can exploit the communications channel between the two networks and bypass the security mechanisms used to protect the CS environment. Since SQL injection is one of the primary forms of information gathering and exploitation used by attackers against databases, the evolution and significance of this particular attack methodology must be evaluated for its impact on CS security. Injection into a database with valuable data can have far-reaching affects, especially in one such as a CS environment where data accuracy and integrity is critical for both business and operational decision-making. Control systems are more adversely affected by SQL injection than are many general IT databases because they are so reliant on data accuracy and integrity. For example, a SQL compromise on a medical records database is problematic because of the data sensitivity and the cost of recovery. Data corruption or subversion of database information could cause CS network downtime, process control failures, or equipment failure in addition to network downtime, loss of profits, and cost of recovery. Successful compromise of a database could result in root compromise of the database and the computer it resides on. If the compromised system is a trusted host on a CS network, escalation of privileges on the CS network or on other CS components could easily be achieved, allowing attackers to directly manipulate the CS processes. 2. DATABASES AND SQL a General information The most popularly-used databases in CS environments are IBM s DB2, Oracle, and Microsoft SQL Server; all of these allow queries and commands to be passed to the database via SQL. Common uses for the databases include: a) simple data storage, b) information linking, and c) credential authentication. The information contained within databases is generally accessed via front-end applications such as client/server or web applications that are user-friendly and facilitate data-gathering from the database in a fashion transparent to the end user. Database components Databases, in this paper, will refer to the Database Management System (DBMS) that may manage relational data structures (RDBMS), flat files, extensible markup language (XML) data, etc. The DBMS is the software which handles all aspects of data management including physical storage, reading and writing data, security, replication, error correction, and other functions. Each DBMS has a way of receiving a SQL statement and processing the instructions found in the statement. The DBMS carries out the instruction whether it is to modify a structure; to insert, update or delete a record; or to return a specific set of data back to the requester. Larger and more complex DBMS applications may be closely integrated with a specific operating system and some actually contain an OS optimized for data management. Some applications can also self-optimize after monitoring the actual conditions a Beginning SQL Programming (Programmer to Programmer), by John Kauffman, et al., WROX,
15 after deployment. A DBMS may include additional features such as query analyzing, replication and back-up tools, user management, security tools, and performance monitoring. SQL SQL is a computer language for communication with databases. The communicating parties are typically a "front end" application that sends a SQL statement across a connection to a database that holds the data. SQL has many capabilities, but the most common needs in business are to: Read, analyze and report on existing data, Create new records holding data, Modify existing data, Append data to an existing record, and Delete data or records. SQL contains key words or parts to perform these basic tasks. Reading data is the most common task. An ANSI-SQL statement requesting a list of names of all members of an organization can be sent from a Visual Basic application to an Oracle database. If the database is later changed to IBM's DB2, the SQL statement is still valid. The SQL language offers many permutations of the request, including the ability to return the names in various orders, only the first or last few names, a list of names without duplicates, and various other requests where people require specific information from their database. Records can be created in a database using SQL. A data entry form on a web site can gather information from a visitor and then structure that data into a SQL statement. The SQL statement will instruct the DBMS to insert a new record into a database using the data gathered on the web page. Since SQL is universally accepted, the same SQL statement could, for example, be formed from, say, a Visual Basic application capturing the same information on a local network. Data can also be changed using SQL. As in the examples above, a front-end user interface such as a web page can accept changes to data and send them via a SQL statement to the DBMS. But there does not have to be direct user interaction. A DB2 database running on an IBM mainframe could have a procedure to connect to another corporate mainframe running Sybase. DB2 can generate and send a SQL statement to modify the data in certain records in the Sybase database. Although the systems are from different vendors and have different ways of storing and using data, they both understand the SQL statement. Deleting data can be performed using SQL statements. In fact, SQL can accommodate very complex sets of conditions for which records to delete and which to leave intact. Portions of data within a record can be deleted or entire tables within the database can be removed. Note: Virtually every application that uses SQL to communicate with a database has expanded the protocol to include proprietary syntax and function calls. While syntax is typically consistent, some expansions of and enhancements to SQL facilitate SQL injection because of their design and implementation. 3
16 3. UNDERSTANDING SQL INJECTION What is SQL injection Attackers perform SQL injection in a number of ways, but there are a few basic steps that occur during any injection process. First, the attacker provides input into an application that passes the data over to the database. The malicious command is incorporated into a SQL query in some fashion that the front-end application screens and accepts as legitimate input, which includes giving the attacker some form of authentication and granting a level of privilege on the database. Then, the application passes the user input and a command associated with that input field to the database, which interprets the user data according to the application command. Generally, the SQL syntax of the input data has been written in such a way that it adheres to the syntactical rules of the language but has some slight twist to the syntax. Finally, the database executes the application command with the interpreted data and produces some result such as database corruption, record deletion, or operating system compromise. SQL injection example The following is an example of breaking out of the quotation limitations per rainforestpuppy s explanation. A full name fed to a MySQL database and encapsulated by quotes may still be used for injection. Proper user input: john doe Translates to: SELECT * FROM records WHERE name= john doe ; Malformed user input: john doe ; DROP TABLE records; # Translates to: SELECT * FROM records WHERE name= john doe ;Drop TABLE records; The trailing # in the Malformed user input command is the MySQL comment operator. It tells the MySQL database to ignore everything that follows the comment operator. This manipulation of SQL syntax allows the attacker to ensure the trailing quote is dropped and the query appears valid. If the program making the malformed query described above had sufficient privileges, the malicious input would destroy the entire records table. This attack could result in the modification or complete destruction of a database. Significance of SQL injection as an attack methodology Since SQL is highly standardized and is an open standard, it is well documented and attackers have detailed understanding of the technical parameters of the language and its intended use. The information also allows attackers to understand how SQL queries may be manipulated during attacks to exploit a database or to use error reports to enumerate the database structure, thereby facilitating the attacker s ability to manipulate data and responses more effectively. SQL is a language used to communicate with databases so it can be used by many different types of front-end applications to query the database. The most problematic of these are the web- 4
17 based front ends because users must be able to create, modify, and delete data. Essentially, the user accessing the front application via a website is given valid authentication token and highlevel permissions on the database without having to demonstrate a valid need for them. The only safeguards in these applications are those included by the programmers to verify the user input, and given that secure code review is a relatively new practice, many front-end applications lack sufficient input checking to prevent SQL injection attacks. The complexity of DBMS code and its focus on user functionality and data manipulation capacity also create increased opportunities for successful attack. The increasing integration of databases into web pages and other data-driven applications means developers need more functionality from the DBMS and expansions on the SQL language. As database vendors strive to improve their products to meet this need, they include more powerful control features for the programmers, making the impact of SQL injection more significant if those features are exploited. Additionally, programmers must understand how the advanced DBMS features impact the security of their applications, a time-consuming task at best. If the developers do not understand the security impact, the chances for software flaws that allow SQL injection to occur are greatly increased. 4. HISTORY OF SQL INJECTION Initial SQL injection research SQL injection as an attack method was first publicized as a side note to a comprehensive Microsoft web services exploitation article. The article first appeared in the fifty-fourth article of Phrack, a digital periodical that covers hacking topics. Titled NT Web Technology Vulnerabilities, the article was written by rainforestpuppy of the WireTrip security group, and discusses Microsoft SQL and ASP injection exploits. b Rainforestpuppy approaches the injection technique as a side note to more serious vulnerabilities. The Phrack 54 article served as a start point for SQL injection. An official advisory concerning the ability to batch commands was posted by the Allaire group (now part of Macromedia) several months later. The Allaire advisory, advisory number ASB99-04, generalized attack methods against ColdFusion, ASP, Sybase SQL, and Microsoft SQL applications. c SQL injection was still a very new concept, and Allaire's advisory assumed that only a very narrow group of systems was vulnerable due to variables being encapsulated with quotes. Microsoft countered with the argument that the issues identified by rainforestpuppy were not vulnerabilities but they were features. The response prompted rainforestpuppy to aggressively pursue his research of SQL injection techniques. The next exploitation and subsequent publication by rainforestpuppy proved Microsoft s claim to be very untrue. How I hacked PacketStorm a look at hacking www threads via SQL, b NT Web Technology Vulnerabilities, rainforestpuppy, December 25, 1998, c Multiple SQL Statements in Dynamic Queries, Allaire security bulletin, February 4, 1999, 5
18 by rainforestpuppy, demonstrated how to directly circumvent some of the barriers to SQL injection that were assumed by the Allaire advisory. d This article was the first to introduce a directed, successful attack using SQL injection and proved how easy it was to actively circumvent implied security features. The structure of the database was enumerated through random input and close analysis of the error reports generated by feeding the database the random data. Through his analysis of the database structure and his understanding of SQL query syntax, rainforestpuppy defeated the limits of quotation by breaking out, using additional sets of quotes to bypass SQL format constraints, and injecting his own commands into the database. Using SQL injection as a primary exploitation tool In early 2002, several papers were released detailing the use of built-in functions within most database applications. The functions in question allowed a user to issue commands from the database to the system. This marked the first time SQL injection was demonstrated as a method for operating system compromise. An example of such a compromise involves the use of injection against a database resident on a Microsoft Windows operating system. The xp_cmdshell procedure allows applications to funnel information back and forth between applications and the operating system shell via a database. If an attacker could successfully inject a malicious command into the database using an account with execution permission, the attacker could then issue arbitrary commands to the shell. These commands would execute with system level, or administrative, permissions because the database typically ran as System, a privileged account, on Windows operating systems. Current trends in research Modern SQL injection research appears to be shifting from aggressive exploitation of hosts to using it as a means of discovery of vulnerabilities. Developers have become more familiar with SQL injection techniques and have begun to attempt to hide revealing information, validate user input more stringently, and limit attackers access to SQL injection points. New versions of scripting languages like PHP and Perl include variable filtering of SQL input. These defensive techniques have made exploitation of hosts via SQL injection more difficult. While actual query exploitation has remained relatively unchanged during the past two years, discovery and mapping of vulnerable hosts has changed drastically. Functions such as sendmail are being employed to subvert error suppression. For example, if an application suppresses all signs of error or success via the front end application, an attacker may be able to utilize sendmail functionality in the DBMS to mail the results to him or herself. From early 2002 to mid-2004, a number of papers were published that focused primarily on a form of database enumeration known as blind SQL injection. Blind SQL injection is the act of mining information regarding the layout of database structures and the feasibility of injection when error messages are suppressed. A skilled attacker can map out a vulnerable application through carefully sequenced syntactical inputs, looking for changes in server behavior. An application that reacts differently to database errors than application level errors provides d How I hacked PacketStorm, rainforestpuppy, February 3, 2000, 6
19 confirmation of a successful query. The confirmation alone is enough information to begin making slight query variations to determine how input is passed to the database and what functions are available. BlackHat 2004, a well-known information security research conference, brought the release of the first publicly available tool for automating the SQL injection process. Absinthe (formerly known as SqueaL) was released by the security group 0x90.org and greatly trivialized the process of gathering information about the structure of a database. Absinthe changed SQLstyle injections as it proved that attacks on applications through injection could become automated. Automation changed the way attacks were carried out, shifting attack methodologies from localized and directed to widespread and ambiguous, with the possibility of worm-like behaviors. Security techniques that relied on error suppression and general obscurity had to be completely rethought. Applications that had previously avoided exploitation were appearing on vulnerability lists at an increasingly rapid pace. 5. FUTURE OF SQL INJECTION AS AN ATTACK METHODOLOGY Level of interest by researchers The names of those associated with innovative SQL injection research are typically available in only two forms: publications or arrest records. The groups and individuals who have published white papers regarding SQL injection represent both white hat and black hat security groups. Big name security firms such as NGS Software have led the research in SQL injection attacks, pioneering enumeration and exploitation techniques of all the major databases via innovative SQL manipulation. These firms have made a great deal of money consulting with database companies and will continue to do so as long as they can find security concerns with them. The black hat community has had resounding success with SQL injection and will most certainly keep developing innovative new techniques in the field. SQL injection will remain a standard tool in penetration testing and exploit toolkits, much like packet fragmentation and buffer overflows, as long as poorly coded applications or legacy systems still remain. Defensive responses Fortunately, as the popularity of SQL injection has grown, Oracle, Microsoft, and IBM have begun to evaluate their database code for security issues as have the other database vendors. They have begun to incorporate security into their product line and are moving more quickly to resolve security issues associated with SQL injection-based attacks. Database and systems administrators harden both the database and the operating system as much as possible prior to deploying the system for production use. The programmers responsible for writing major enterprise applications have begun to review user input more closely and incorporating more stringent security techniques into the code, making new versions of their software more resistant to the known forms of SQL injection. Scripting languages such as PHP now include variable content filtering that scrubs SQL queries before they are sent to the database. 7
20 These defensive responses have evolved in response to the IT security community s recognition of the seriousness of the SQL injection threat. The number of critical vulnerabilities announced by vendors because of SQL injection exploits has decreased greatly in most widely used enterprise applications. Many of the SQL injection vulnerabilities are in niche applications, whose software developers may not fully understand the ramifications of insecure coding, because major vendors have made SQL injection more difficult to perform. Unfortunately, this still leaves a large number of vulnerable systems open for attack. New applications whose programmers did not incorporate sufficient security mechanisms, outdated applications that are not slated for upgrade because of financial issues, and niche applications that will not run in secured environments all hinder security efforts and are commonly found on both IT and CS networks. SQL injection will remain a popular form of attack until vulnerable applications can be replaced. The timeline for such a change in the networked computing environment will last several years. Since software upgrades are costly, security enhancements happen slowly, leaving attackers a significant period of time during which SQL injection will prove effective for them to exploit networks hosting SQL databases. Impact on control system security CS networks have not been designed with security as an inherent feature in the system. Rather, security is an added layer on the network, not a core component of network communication design, operating system administration, or application development. Given the reliance of CS systems on the storage, accuracy, and accessibility of CS data and the prevalence of SQL databases on these networks, standard SQL injection techniques against CS components using COTS database technology and customized SQL injection exploits designed to run against proprietary CS applications pose a major threat to CS security. Allocation of defensive resources As the IT community begins to become more familiar with SQL injection and incorporate defensive technologies to limit attacks, these methods can be evaluated for use in CS networks. CS security should include: Securing communications between business applications and CS databases; Incorporating design techniques within the database to circumvent injection attempts; Increasing the defenses on CS components containing databases or layering security around those components if they cannot be hardened; Ensuring that adequate means of detecting SQL injection attacks against CS databases are in place; and, Purchasing new products that actively incorporate SQL security into database and application design when legacy systems are replaced. 8
Lecture 15 - Web Security
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 15 - Web Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
Attack Methodology Analysis: Emerging Trends in Computer- Based Attack Methodologies and Their Applicability to Control System Networks
INL/EXT-05-00477 Attack Methodology Analysis: Emerging Trends in Computer- Based Attack Methodologies and Their Applicability to Control System Networks Bri Rolston June 2005 The INL is a U.S. Department
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
SQL Injection January 23, 2013
Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2
Last Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Analysis of SQL injection prevention using a proxy server
Computer Science Honours 2005 Project Proposal Analysis of SQL injection prevention using a proxy server By David Rowe Supervisor: Barry Irwin Department of Computer
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
CHAPTER - 3 WEB APPLICATION AND SECURITY
CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Penetration Testing: Advanced Oracle Exploitation Page 1
Penetration Testing: Advanced Oracle Exploitation Page 1 Course Index:: Day 1 Oracle RDBMS and the Oracle Network Architecture... 3» Introduction and Oracle Review...3» Service Information Enumeration:...3»
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
SQL Injection. By Artem Kazanstev, ITSO and Alex Beutel, Student
SQL Injection By Artem Kazanstev, ITSO and Alex Beutel, Student SANS Priority No 2 As of September 2009, Web application vulnerabilities such as SQL injection and Cross-Site Scripting flaws in open-source
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium
Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium Organizations need an end-to-end web application and database security solution to protect data, customers, and their businesses.
Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques.
Guarding Against SQL Server Attacks: Hacking, cracking, and protection techniques. In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Network Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
Testing Web Applications for SQL Injection Sam Shober [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected] Abstract: This paper discusses the SQL injection vulnerability, its impact on web applications, methods for pre-deployment and
SQL Injection and Data Mining through Inference
SQL Injection and Data Mining through Inference David Litchfield What is SQL Injection? A SQL Injection vulnerability is a type of security hole that is found in a multi-tiered application; it is where
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA
Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering
SSDP REFLECTION DDOS ATTACKS
TLP: AMBER GSI ID: 1079 SSDP REFLECTION DDOS ATTACKS RISK FACTOR - HIGH 1.1 OVERVIEW / PLXsert has observed the use of a new reflection and amplification distributed denial of service (DDoS) attack that
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Penetration Testing. Presented by
Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing
Maintaining Stored Procedures in Database Application
Maintaining Stored Procedures in Database Application Santosh Kakade 1, Rohan Thakare 2, Bhushan Sapare 3, Dr. B.B. Meshram 4 Computer Department VJTI, Mumbai 1,2,3. Head of Computer Department VJTI, Mumbai
B.Sc (Computer Science) Database Management Systems UNIT-V
1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used
B database Security - A Case Study
WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4
Introduction to IT Security
Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 30 November 2015 Marek Rychly ES, 30 November
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Foundstone ERS remediation System
Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
Penetration Testing in Romania
Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Sandbox Roulette: Are you ready for the gamble?
Sandbox Roulette: Are you ready for the gamble? Rafal Wojtczuk [email protected] Rahul Kashyap [email protected] What is a sandbox? In computer security terminology, a sandbox is an environment designed
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
White Paper. Blindfolded SQL Injection
White Paper In the past few years, SQL Injection attacks have been on the rise. The increase in the number of Database based applications, combined with various publications that explain the problem and
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Database Security & Auditing
Database Security & Auditing Jeff Paddock Manager, Enterprise Solutions September 17, 2009 1 Verizon 2009 Data Breach Investigations Report: 285 million records were compromised in 2008 2 Agenda The Threat
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
SEER Enterprise Shared Database Administrator s Guide
SEER Enterprise Shared Database Administrator s Guide SEER for Software Release 8.2 SEER for IT Release 2.2 SEER for Hardware Release 7.3 March 2016 Galorath Incorporated Proprietary 1. INTRODUCTION...
Threat Modelling for Web Application Deployment. Ivan Ristic [email protected] (Thinking Stone)
Threat Modelling for Web Application Deployment Ivan Ristic [email protected] (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Best Practices for Database Security
Database Security Databases contain a large amount of highly sensitive data, making database protection extremely important. But what about the security challenges that can pose a problem when it comes
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
How I hacked PacketStorm (1988-2000)
Outline Recap Secure Programming Lecture 8++: SQL Injection David Aspinall, Informatics @ Edinburgh 13th February 2014 Overview Some past attacks Reminder: basics Classification Injection route and motive
RACK911 Labs. Year in Review. May 6, 2014
RACK911 Labs Year in Review May 6, 014 The security of the hosting industry has always been a concern of RACK911 and in May of 013 we decided to take a more proactive role by creating a new brand called
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
External Penetration Assessment and Database Access Review
External Penetration Assessment and Database Access Review Performed by Protiviti, Inc. At the request of Internal Audit April 25, 2012 Note: This presentation is intended solely for the use of the management
Comprehensive Approach to Database Security
Comprehensive Approach to Database Security [email protected] NYOUG 2008 1 What will I discuss today Identify Threats, Vulnerabilities and Risk to Databases Analyze the drivers for Database Security Identify
Database Security Guide
Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document
IQware's Approach to Software and IT security Issues
IQware's Approach to Software and IT security Issues The Need for Security Security is essential in business intelligence (BI) systems since they have access to critical and proprietary enterprise information.
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
