Database System Security. Paul J. Wagner UMSSIA 2008
|
|
|
- Belinda Watkins
- 10 years ago
- Views:
Transcription
1 Database System Security Paul J. Wagner UMSSIA 2008
2 Need for Database System Security Education The value is in the data 3M Poster Attacks have changed from glory-seeking to attempted financial gain Security curriculum is relatively light in database systems area! Focus currently on protecting information through network configuration, systems administration, application security
3 Goals Understand security issues in a general database system environment, with examples from specific database management systems (DBMSs) Consider database security issues in context of general security principles and ideas Examine issues relating to both database storage and database system communication with other applications
4 Main Message Database system security is more than securing the database; to achieve a secure database system, we need a:! Secure database! Secure DBMS! Secure applications / application development! Secure operating system in relation to database system! Secure web server in relation to database system! Secure network environment in relation to database system
5 diagram from.net Framework Security article, Meier et. al.
6 Secure Databases Database a domain-specific collection of data; e.g. UWEC student database Historical database security framework! Separate set of usernames, passwords! Database administrator assigns privileges for each user
7 Secure Databases (2) Security issues! Default users/passwords, especially if have higher-level privileges Oracle: sys, system accounts privileged (Oracle 8i and prior - with default passwords) Oracle: scott account well-known account and password, part of public group! e.g. public can access all_users table! General password policies (length, domain, changing, protection)
8 Secure Databases (3) Managing Privileges! Privilege types System - actions Object data! Problem: M (users) x N (privileges) possible combinations! Solution: Roles (a security pattern) Collections of (usually system) privileges! Manage with Grant / Revoke, higher level tools Giving (or removing ) privileges or roles to (from) users
9 Secure Databases (4) Encryption of Data! Sensitive data should be encrypted within database! Most DBMSs now have utilities for this! Examine cost of this process May slow access time, use resources May interfere with system administration! Don t t forget about data once out of the database Need to decrypt for users Ensure data is still protected when DB sends it to a client for usage, or when client sends to DB
10 Secure Databases (5) Other Database Issues Inference Attack! Statistical Database database used for statistical purposes, usually Online Analytical Processing (OLAP) as in data warehouse sitituations Generally allows only aggregate function queries (may be limited to SUM, COUNT, AVERAGE) on a group of rows May not allow queries on individual rows! Problem: it may still be possible to infer individual data values from such a database
11 Secure Databases (6)! Inference Attack Example: Base query: find count of all UWEC students Example SQL:! SELECT Count(*) FROM StudentDB; returns single number, ~10,000 doesn t t expose any individual information, but we can do more
12 Secure Databases (7)! Inference Attack Example (2): Find count of UWEC students that:! Have a local address in Eau Claire! Have a GPA of between 3.1 and 3.2! Are majoring in computer science SELECT Count(*) FROM StudentDB WHERE cond1 AND cond2 AND cond3 AND Getting count down to fewer and fewer students as we add filter conditions If count gets down to 1, you know an individual exists with those characteristics
13 Secure Databases (8)! May even be able to gain private information Find average hourly pay rate for UWEC students that have the above characteristics! Inference Attack Prevention Techniques: Return an approximate number of rows (e.g. between A and B) Limit the number of filtering conditions on a query Return ranges for values, especially for sensitive fields (e.g. salary falls between X and Y)! Difficult to balance functionality and security with such data
14 Secure Databases (9) Other Database Issues - Correlation Attack! Data in database may be anonymous! However, it may be able to be correlated with another set of data which is not anonymous Anonymity can thus be removed! Example: Statistical analysis of public but anonymized Netflix data set using Internet Movie Database (imdb.com) data By comparing rankings and timestamps from Netflix data, authors identified a subset of individuals through correlated data from IMDB
15 Secure Databases (10) More Information on this attack nymity_and_t_2.html - Discussion of problem in general, this analysis, other similar efforts prelim.pdf - Paper on the original analysis
16 Secure DBMS Database Management System (DBMS) the domain- independent set of software used to manage and access your database(s) Many Possible Holes in DBMS software! (50+ listed)! Majority of problems - buffer overflow problems in (legacy) DBMS code! Miscellaneous attacks (Denial of Service, source code disclosure of stored procedures and JSPs, others) DBMS is not an island! Oracle example - UTL_FILE package in PL/SQL (Oracle s procedural language on top of SQL) allows read/write access to files in directory/ies specified in utl_file_dir parameter in init.ora possible access through symbolic links
17 Secure DBMS (2) Need for continual patching of DBMS! Encourage awareness of issues, continuous vigilance as a database administrator! Cost of not patching SQL Slammer Worm - ~100,000 systems affected! Even though patch had been available for 6 months
18 Secure DBMS (3) US-CERT advisories! List of major software packages currently watched includes Oracle
19 Secure Application Development Access to Oracle Database or Environment Through Applications Need to consider security of applications using database as well as security of data in database itself Example: SQL Injection Attack
20 SQL Injection SQL Injection! Definition inserting malicious SQL code through an application interface Often through web application, but possible with any interface! Typical scenario Three-tier application (web interface, application, database) Overall application tracks own usernames and passwords in database (advantage: can manage users in real time) Web interface accepts username and password, passes these to application layer as parameters
21 SQL Injection (2)! Example: Application Java code (receiving username and password from client) contains SQL statement: String query = "SELECT * FROM users_table " + " WHERE username = " + " " + username + " " + " AND password = " + " " + password + " " Expected Result: "SELECT * FROM users_table WHERE username = wagnerpj AND password = paulpass ; Note: String values must be single quoted in SQL, so application provides these before and after each passed string parameter
22 SQL Injection (3)! Application is expecting one username/password pair row to be returned if success, no rows if failure! Common variant to simplify the above check: SELECT COUNT(*) FROM users_table WHERE username = someuser AND password = somepass ;
23 ! Attacker enters: SQL Injection (4) any username (valid or invalid) password of: Aa OR =! Query becomes: SELECT * FROM users_table WHERE username = anyname AND password = Aa OR = ;! Note: WHERE clause =>? and F or T => F or T => T AND has higher precedence than OR! All user/pass rows returned to application! If application checking for 0 vs. more than 0 rows, attacker is in
24
25 SQL Injection - Prevention What s s the problem here?! Not checking and controlling input properly Specifically, not controlling string input! Note: there are a variety of ways SQL injection can happen Regular inclusion of SQL metacharacters through! Variable interpolation! String concatenation with variables and/or constants! String format functions like sprintf()! String templating with variable replacement Hex or Unicode encoded metacharacters
26 SQL Injection Prevention (2) How to resolve this?! First Possible Solution: Check Content Client code checks to ensure certain content rules are met Server code checks content as well (why?) Specifically don t t allow apostrophes to be passed Problem: there are other characters that can cause problems; e.g.! -- // SQL comment character! ; // SQL command separator! % // SQL LIKE subclause wildcard character Which characters do you filter (blacklist) / keep (whitelist)?! Question: is it better to blacklist or whitelist?
27 SQL Injection Variant 1 Any username, password: or 1=1--! Note: -- comments out rest of line, including terminating single quote in application Query becomes: SELECT * FROM users_table WHERE username = anyname AND password = OR 1=1-- ; Note: OR 1=1 can be appended to any numeric input and force evaluation to true! Numeric SQL injection vs. String SQL injection
28 SQL Injection Variant 2 Any username, password: foo ;DELETE FROM users_table WHERE username LIKE % Query becomes: SELECT * FROM users_table WHERE username = anyname AND password = foo ;; DELETE FROM users_table WHERE username LIKE % Note: system executes two statements! SELECT * FROM users_table WHERE username = anyname AND password = foo ; // returns nothing! DELETE FROM users_table WHERE username LIKE % Depending on level of privilege for executing user, we may have trouble here
29 SQL Injection Variant 3 ODBC (open database connectivity, between any language and any DBMS) allowed shell injection using character! shell( shell( cmd /c echo & char(124) & format c: ) ) Similar issue has existed with MS SQL Server Extended Stored Procedures
30 SQL Injection Variant 4 Second-Order SQL Injection! User creates account with user = root -- Application escapes and inserts as root --! User resets password using script/application Query fetches username from database to verify account exists with correct old password; then executes: UPDATE users_table SET PASSWORD= pass pass WHERE username = root --! NOTE: above scenario allows user to reset the password on the real root account
31 SQL Injection Variant 5 PL/SQL Cursor Injection Structure! PL/SQL is procedural language in Oracle built on top of SQL! Functions and procedures can be defined which set up cursors that allow execution of dynamically- defined SQL statements! Injection techniques can be used with these structures as well r-injection.pdf
32 SQL Injection Variant 6 Assume web page that gets press releases from db! Generates:! SELECT title, description, releasedate, body FROM pressreleases WHERE id = 5 What if send:! AND 1=1! If get press release 5 back, there is a vulnerability Now can send:! AND user_name() = dbo! If get p.r. 5, know that you re running as user dbo from HP white paper on Blind SQL Injection
33 SQL Injection Interlude Many possible variations of SQL Injection Many potential metacharacters to filter! Dependent on DBMS variety Maybe filtering input by blacklisting metacharacters isn t t the best approach What is the core problem here?! How is SQL injection similar to a buffer overflow?
34 SQL Injection Prevention (3) Review! Regular Statements SQL query (a string) is generated entirely at run-time Custom procedure and data are compiled and run Compilation allows combination of procedure and data, allowing problems with SQL metacharacters String sqlquery = null; Statement stmt = null; sqlquery = "select * from users where " + "username = " + "'" + fe.getusername() + "'" + " and " + "upassword = " + "'" + fe.getpassword() + "'"; stmt = conn.createstatement(); rset = stmt.executequery(sqlquery);
35 SQL Injection Prevention(4) Better Solution! Prepared Statements (Parameterized Queries) SQL query is precompiled with placeholders Data is added in at run-time, converted to correct type for the given fields String sqlquery = null; PreparedStatement pstmt = null; sqlquery = "select * from users where username =? and upassword =?"; pstmt = conn.preparestatement(sqlquery); pstmt.setstring(1, fe.getusername()); pstmt.setstring(2, fe.getpassword()); rset = pstmt.executequery();
36 SQL Injection Prevention (5) Issues with PreparedStatements! Cannot use them in all situations Generally limited to replacing field values in SELECT, INSERT, UPDATE, DELETE statements! E.g. our use for username field value, password field value Example: if also asking user for information that determines choice of table name, cannot use a prepared statement
37 SQL Injection Prevention (6) Additional Precautions! Do not access the database as a privileged user Attacker who gains access through user will have that user s privileges! Limit database user to only what they need to do e.g. reading information from database, no insert/update/delete! Do not allow direct access to database from the internet Require users to go through your (controlled) applications! Do not embed database account passwords in your code Encrypt and store them in a repository that is read at application startup! Do not expose information in error messages E.g. do not display stack traces
38 Other Application Issues Be aware of how information is transmitted between client applications and database Student Research Project at UWEC tested 5 DBMSs and various clients (vendor and user)! Most common client applications (vendor-supplied or user-programmed) at least encrypt the connection password! Some clients encrypt the connection user! Certain DBMSs have varying levels of security (e.g. PostgreSQL)! One DBMS transmits the connection password length (MS SQL Server 2005 Express)
39 Other Application Issues (2) Be aware of how application exposes information Example: Panel rating system displays each reviewer s s rating for each proposal! but doesn t t display individual ratings for a given proposal unless you ve entered your rating! default display is in recommended discussion order, so no information disclosed
40 Other Application Issues (3) However, panel rating system also allows you to sort data by any column, including ratings (average) This allows you to see the approximate average rating by other reviewers before entering your rating Not a big deal here, but point is that applications may be able to be used in certain ways to expose information
41 Secure Application Development Application Security in the Enterprise Environment! J2EE JDBC, Servlets, JSPs, JNDI, EJBs,!.NET many components! Need to be aware of security issues with each component, interaction of components Use of Proxy Applications! Assume network filtering most evil traffic! Application can control fine-grain behavior, application protocol security
42 Secure Application Development (2) Security Patterns (from J2EE Design Patterns Applied)! Single-Access Point Pattern single point of entry into system Example violation: online course system! Check Point Pattern centralized enforcement of authentication and authorization! Role Pattern disassociation of users and privileges
43 Secure Operating System DBMS interacts with operating system! File manipulation! Can often run shell commands from DBMS! DBMS procedural languages often have packages that interact directly with OS! Installation of DBMS uses file system! DBMS uses OS resources
44 Secure Operating System (2) Interaction of Oracle and OS! Windows Secure administrative accounts Control registry access Need good account policies Others
45 Secure Operating System (3)! Linux/Unix Choose different account names than standard suggestions Restrict use of the account that owns Oracle software Secure temporary directory Some Oracle files are SUID (root) Command line SQL*Plus with user/pass parameters appears under ps output Others
46 Secure Web Server Interaction of Oracle and Web Server Apache now provided within Oracle as its application server, started by default Apache issues! Standard configuration has some potential problems See Oracle Security Handbook for more discussion! Ensure secure communication from web clients to web server! Use MaxClients to limit possible connections! Others
47 Secure Web Server (cont.) Internet Information Server (IIS) issues! Integration with other MS products (e.g. Exchange Server)! Many known vulnerabilities over past versions (patches available)
48 Secure Network Interaction of Oracle and Network! Oracle Advanced Security (OAS) product Features for:! Authentication! Integrity! Encryption use of SSL! Oracle server generally behind firewall Good to separate DB and web servers Connections normally initiated on port 1521, but then dynamically selected! Other Network Issues To Consider Possibility of hijacking a sys/sysmgr connection Various sniffing and spoofing issues
49 Miscellaneous Issues Newer Oracle Security Features! Virtual Private Databases (VPDs)! Oracle Label Security Auditing! Good policy: develop a comprehensive audit system for database activity tracking Database system: can accomplish with triggers! On any {read write }, write to audit log table Can write to OS as well as into database for additional security, accountability for all working with databases
50 Possible Exercise Overall Security Examination of Database System in Networked Environment! 1) Database: Set up client(s), test database(s) for: Privileged access accounts Public access through other known/discovered usernames! 2) DBMS: Check for known vulnerabilities Check overall system level, patch level Test for specific problems gathered from web search, literature! 3) Application: Test for SQL Injection, other application weaknesses
51 Possible Exercise (2)! Similar types of tasks for OS, Web Server, Network components! Task: develop report, including specifics for all areas
52 Conclusion Database system security is more than securing the database; to achieve a secure database system, we need a:! Secure database! Secure DBMS! Secure applications / application development! Secure operating system in relation to database system! Secure web server in relation to database system! Secure network environment in relation to database system
53 References Oracle Security Handbook by Theriault and Newman; Osborne/Oracle Press, Oracle Database Administration: The Essential Reference,, Kreines and Laskey; O Reilly, O Pete Finnigan s s Oracle Security web site, James Walden s s SIGCSE 2006 workshop on Software Programming Security: Buffer Overflows and Other Common Mistakes Eric Lobner, Matthew Giuliani, Paul Wagner; Investigating Database Security in a Network Environment,, paper published at MICS 2006,
An Introduction to SQL Injection Attacks for Oracle Developers. January 2004 INTEGRIGY. Mission Critical Applications Mission Critical Security
An Introduction to SQL Injection Attacks for Oracle Developers January 2004 INTEGRIGY Mission Critical Applications Mission Critical Security An Introduction to SQL Injection Attacks for Oracle Developers
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
How I hacked PacketStorm (1988-2000)
Outline Recap Secure Programming Lecture 8++: SQL Injection David Aspinall, Informatics @ Edinburgh 13th February 2014 Overview Some past attacks Reminder: basics Classification Injection route and motive
WHITE PAPER. An Introduction to SQL Injection Attacks for Oracle Developers
WHITE PAPER An Introduction to SQL Injection Attacks for Oracle Developers MARCH 2007 AN INTRODUCTION TO SQL INJECTION ATTACKS FOR ORACLE DEVELOPERS Version 1.0 April 2003 Version 1.1 January 2004 Version
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Advanced SQL Injection in Oracle databases. Esteban Martínez Fayó
Advanced SQL Injection in Oracle databases Esteban Martínez Fayó February 2005 Outline Introduction SQL Injection attacks How to exploit Exploit examples SQL Injection in functions defined with AUTHID
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, [email protected] Steve Davis, Clemson University, [email protected] ABSTRACT People considering improvements in database
Oracle. Brief Course Content This course can be done in modular form as per the detail below. ORA-1 Oracle Database 10g: SQL 4 Weeks 4000/-
Oracle Objective: Oracle has many advantages and features that makes it popular and thereby makes it as the world's largest enterprise software company. Oracle is used for almost all large application
Agenda. SQL Injection Impact in the Real World. 8.1. Attack Scenario (1) CHAPTER 8 SQL Injection
Agenda CHAPTER 8 SQL Injection Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern, and Anita Kesavan (ISBN 1590597842; http://www.foundationsofsecurity.com).
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Serious Threat. Targets for Attack. Characterization of Attack. SQL Injection 4/9/2010 COMP620 1. On August 17, 2009, the United States Justice
Serious Threat SQL Injection COMP620 On August 17, 2009, the United States Justice Department tcharged an American citizen Albert Gonzalez and two unnamed Russians with the theft of 130 million credit
MySQL Security for Security Audits
MySQL Security for Security Audits Presented by, MySQL AB & O Reilly Media, Inc. Brian Miezejewski MySQL Principal Consultat Bio Leed Architect ZFour database 1986 Senior Principal Architect American Airlines
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Database Security Guide
Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document
Jet Data Manager 2012 User Guide
Jet Data Manager 2012 User Guide Welcome This documentation provides descriptions of the concepts and features of the Jet Data Manager and how to use with them. With the Jet Data Manager you can transform
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Database Design Patterns. Winter 2006-2007 Lecture 24
Database Design Patterns Winter 2006-2007 Lecture 24 Trees and Hierarchies Many schemas need to represent trees or hierarchies of some sort Common way of representing trees: An adjacency list model Each
THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application
THREAT MODELLING FOR SQL SERVERS Designing a Secure Database in a Web Application E.Bertino 1, D.Bruschi 2, S.Franzoni 2, I.Nai-Fovino 2, S.Valtolina 2 1 CERIAS, Purdue University, West Lafayette, IN,
What is ODBC? Database Connectivity ODBC, JDBC and SQLJ. ODBC Architecture. More on ODBC. JDBC vs ODBC. What is JDBC?
What is ODBC? Database Connectivity ODBC, JDBC and SQLJ CS2312 ODBC is (Open Database Connectivity): A standard or open application programming interface (API) for accessing a database. SQL Access Group,
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
SQL Injection January 23, 2013
Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Database Programming. Week 10-2. *Some of the slides in this lecture are created by Prof. Ian Horrocks from University of Oxford
Database Programming Week 10-2 *Some of the slides in this lecture are created by Prof. Ian Horrocks from University of Oxford SQL in Real Programs We have seen only how SQL is used at the generic query
Overview. Edvantage Security
Overview West Virginia Department of Education (WVDE) is required by law to collect and store student and educator records, and takes seriously its obligations to secure information systems and protect
1. What is SQL Injection?
SQL Injection 1. What is SQL Injection?...2 2. Forms of vulnerability...3 2.1. Incorrectly filtered escape characters...3 2.2. Incorrect type handling...3 2.3. Vulnerabilities inside the database server...4
ADO and SQL Server Security
ADO and SQL Server Security Security is a growing concern in the Internet/intranet development community. It is a constant trade off between access to services and data, and protection of those services
How To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations
orrelog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:[email protected] CorreLog, SQL Table Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
The release notes provide details of enhancements and features in Cloudera ODBC Driver for Impala 2.5.30, as well as the version history.
Cloudera ODBC Driver for Impala 2.5.30 The release notes provide details of enhancements and features in Cloudera ODBC Driver for Impala 2.5.30, as well as the version history. The following are highlights
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Oracle Database 12c: Introduction to SQL Ed 1.1
Oracle University Contact Us: 1.800.529.0165 Oracle Database 12c: Introduction to SQL Ed 1.1 Duration: 5 Days What you will learn This Oracle Database: Introduction to SQL training helps you write subqueries,
Implementing Database Security and Auditing
Implementing Database Security and Auditing A guide for DBAs, information security administrators and auditors Ron Ben Natan ELSEVIER DIGITAL PRESS Amsterdam Boston Heidelberg London New York Oxford P
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
Database Assessment. Vulnerability Assessment Course
Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Introduction Configuration
SQL Injection. Slides thanks to Prof. Shmatikov at UT Austin
SQL Injection Slides thanks to Prof. Shmatikov at UT Austin Dynamic Web Application GET / HTTP/1.0 Browser HTTP/1.1 200 OK Web server index.php Database server slide 2 PHP: Hypertext Preprocessor Server
Defense In-Depth to Achieve Unbreakable Database Security
Defense In-Depth to Achieve Unbreakable Database Security Qiang Lin, Ph.D Abstract Enterprises realize that sole reliance on generic security mechanisms does not provide the protection they need for their
Security Analysis. Spoofing Oracle Session Information
November 12, 2006 Security Analysis Spoofing Oracle Session Information OVERVIEW INTRODUCTION Oracle Database session information includes database user name, operating system user name, host, terminal,
Demystified CONTENTS Acknowledgments xvii Introduction xix CHAPTER 1 Database Fundamentals CHAPTER 2 Exploring Relational Database Components
Acknowledgments xvii Introduction xix CHAPTER 1 Database Fundamentals 1 Properties of a Database 1 The Database Management System (DBMS) 2 Layers of Data Abstraction 3 Physical Data Independence 5 Logical
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Oracle Database Security
breaking through barriers to progress By Raman Jathar an award winning '2004 Future 50 Company' 18650 W. Corporate Drive Suite 120 Brookfield, WI 53045 262.792.0200 Database Security Lately, database security
Oracle Security Auditing
Introduction - Commercial Slide. RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 Founded February 2003 CEO Pete Finnigan Clients UK,
Oracle Security Auditing
RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 1 Introduction - Commercial Slide. Founded February 2003 CEO Pete Finnigan Clients
DBMS / Business Intelligence, SQL Server
DBMS / Business Intelligence, SQL Server Orsys, with 30 years of experience, is providing high quality, independant State of the Art seminars and hands-on courses corresponding to the needs of IT professionals.
Securing your Apache Tomcat installation. Tim Funk November 2009
Securing your Apache Tomcat installation Tim Funk November 2009 Who am I? Tomcat committer for over 7 years Day job: programmer at Armstrong World Industries. Why? function search() { var q = document.search.q.value.split(/\w+/);
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Different ways to guess Oracle database SID
30 October 2008 Different ways to guess Oracle database SID Digitаl Security Research Group (DSecRG) Alexander Polyakov [email protected] http://dsecrg.ru Content Introduction...3 A brief info about SID
Maintaining Stored Procedures in Database Application
Maintaining Stored Procedures in Database Application Santosh Kakade 1, Rohan Thakare 2, Bhushan Sapare 3, Dr. B.B. Meshram 4 Computer Department VJTI, Mumbai 1,2,3. Head of Computer Department VJTI, Mumbai
Oracle Database: SQL and PL/SQL Fundamentals NEW
Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database: SQL and PL/SQL Fundamentals NEW Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals
Managing Oracle E-Business Suite Security
Managing Oracle E-Business Suite Security Erik Graversen, Senior Principal Software Developer Elke Phelps, Senior Principal Product Manager Oracle E-Business Suite Applications Technology Oracle Open World,
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Penetration Testing: Advanced Oracle Exploitation Page 1
Penetration Testing: Advanced Oracle Exploitation Page 1 Course Index:: Day 1 Oracle RDBMS and the Oracle Network Architecture... 3» Introduction and Oracle Review...3» Service Information Enumeration:...3»
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Using SQL Server Management Studio
Using SQL Server Management Studio Microsoft SQL Server Management Studio 2005 is a graphical tool for database designer or programmer. With SQL Server Management Studio 2005 you can: Create databases
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Top Ten Web Attacks. Saumil Shah Net-Square. BlackHat Asia 2002, Singapore
Top Ten Web Attacks Saumil Shah Net-Square BlackHat Asia 2002, Singapore TodayÕs battleground Ð the Web Web sites and web applications rapidly growing. Complex business applications are now delivered over
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
BLIND SQL INJECTION (UBC)
WaveFront Consulting Group BLIND SQL INJECTION (UBC) Rui Pereira,B.Sc.(Hons),CISSP,CIPS ISP,CISA,CWNA,CPTS/CPTE WaveFront Consulting Group Ltd [email protected] www.wavefrontcg.com 1 This material
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Oracle Database: SQL and PL/SQL Fundamentals
Oracle University Contact Us: 1.800.529.0165 Oracle Database: SQL and PL/SQL Fundamentals Duration: 5 Days What you will learn This course is designed to deliver the fundamentals of SQL and PL/SQL along
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova
SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova Where someone is building a Web application, often he need to use databases to store information, or to manage user accounts. And
Database Security. Chapter 21
Database Security Chapter 21 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed to. E.g., A student can t see other students grades. Integrity: Users should
D50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
Oracle Database: SQL and PL/SQL Fundamentals NEW
Oracle University Contact Us: + 38516306373 Oracle Database: SQL and PL/SQL Fundamentals NEW Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals training delivers the
Oracle Database 10g: Introduction to SQL
Oracle University Contact Us: 1.800.529.0165 Oracle Database 10g: Introduction to SQL Duration: 5 Days What you will learn This course offers students an introduction to Oracle Database 10g database technology.
Oracle 11g Database Administration
Oracle 11g Database Administration Part 1: Oracle 11g Administration Workshop I A. Exploring the Oracle Database Architecture 1. Oracle Database Architecture Overview 2. Interacting with an Oracle Database
Enhanced Model of SQL Injection Detecting and Prevention
Enhanced Model of SQL Injection Detecting and Prevention Srinivas Baggam, Assistant Professor, Department of Computer Science and Engineering, MVGR College of Engineering, Vizianagaram, India. [email protected]
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
Database Administration with MySQL
Database Administration with MySQL Suitable For: Database administrators and system administrators who need to manage MySQL based services. Prerequisites: Practical knowledge of SQL Some knowledge of relational
Oracle Database: Program with PL/SQL
Oracle Database: Program with PL/SQL Duration: 5 Days What you will learn This Oracle Database: Program with PL/SQL training starts with an introduction to PL/SQL and then explores the benefits of this
