Detecting and Stopping Cyber Attacks against Oracle Databases



Similar documents
Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015

Oracle Database Security Myths

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Guide to Auditing and Logging in the Oracle E-Business Suite

How to Audit the Top Ten E-Business Suite Security Risks

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Security Implications of Oracle Product Desupport April 23, 2015

Top Ten Fraud Risks in the Oracle E Business Suite

mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Top 10 Database. Misconfigurations.

AppSentry Application and Database Security Auditing

Encrypting Sensitive Data in Oracle E-Business Suite

Oracle Security Tools

Securing Oracle E-Business Suite in the Cloud

MySQL Security: Best Practices

All Things Oracle Database Encryption

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Thick Client Application Security

New Security Features in Oracle E-Business Suite 12.2

Integrigy Corporate Overview

Need for Database Security. Whitepaper

Database Security & Auditing

How To Secure The Org Database

WHITE PAPER. Guide to Auditing and Logging Oracle Databases

WHITE PAPER. Guide to Auditing and Logging in the Oracle E-Business Suite

WHITE PAPER. Guide to Auditing and Logging in the Oracle E-Business Suite

Passing PCI Compliance How to Address the Application Security Mandates

New Oracle 12c Security Features Oracle E-Business Suite Perspective

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Security Analysis. Spoofing Oracle Session Information

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Oracle Security Auditing

Oracle Security Auditing

USM IT Security Council Guide for Security Event Logging. Version 1.1

Real-Time Database Protection and. Overview IBM Corporation

Auditing Data Access Without Bringing Your Database To Its Knees

Internal Penetration Test

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Implementing Database Security and Auditing

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

2012 Data Breach Investigations Report

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

CYBERTRON NETWORK SOLUTIONS

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Auditing the Security of an SAP HANA Implementation

Where every interaction matters.

Secret Server Qualys Integration Guide

SecurityMetrics Vision whitepaper

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Hacking databases for owning your data. Cesar Cerrudo Esteban Martinez Fayo Argeniss (

NYOUG Spring 2015 Its Only Auditing - Don t Be Afraid

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Managing Oracle E-Business Suite Security

CRYPTUS DIPLOMA IN IT SECURITY

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Windows Remote Access

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Security Solution Architecture for VDI

Metasploit The Elixir of Network Security

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

GFI White Paper PCI-DSS compliance and GFI Software products

FileCloud Security FAQ

RSA Security Anatomy of an Attack Lessons learned

Securing SharePoint 101. Rob Rachwald Imperva

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Penetration Testing Report Client: Business Solutions June 15 th 2015

PCI Compliance in Oracle E-Business Suite

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Database Security and Auditing: Leading Practices. Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc.

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

The Top Web Application Attacks: Are you vulnerable?

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Penetration: from Application down to OS

Securing Database Servers. Database security for enterprise information systems and security professionals

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Detailed Description about course module wise:

Microsoft Active Directory and Windows Security Integration with Oracle Database

WHITEPAPER. Nessus Exploit Integration

Building a Robust Web Application Security Plan

Transcription:

Detecting and Stopping Cyber Attacks against Oracle Databases Oracle OpenWorld 2015 Stephen Kost Chief Technology Officer Integrigy Corporation

Agenda How and Why Prevention Q&A 1 2 3 4 5 Targeted Attack Detection

About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and Microsoft SQL Server Products Services AppSentry ERP Application and Database Security Auditing Tool AppDefend Enterprise Application Firewall for the Oracle E-Business Suite Validates Security Protects Oracle EBS Verify Security Ensure Compliance Build Security Security Assessments ERP, Database, Sensitive Data, Pen Testing Compliance Assistance SOX, PCI, HIPAA Security Design Services Auditing, Encryption, DMZ You

Integrigy Published Security Alerts Security Alert Versions Security Vulnerabilities Critical Patch Update April 2012 11.5.10 12.1.x Oracle E-Business Suite security architecture issue Critical Patch Update July 2011 11.5.10 12.1.x Oracle E-Business Suite security configuration issue Critical Patch Update October 2010 11.5.10 12.1.x 2 Oracle E-Business Suite security weaknesses Critical Patch Update July 2008 Critical Patch Update April 2008 Critical Patch Update July 2007 Oracle 11g 11.5.8 12.0.x 12.0.x 11.5.7 11.5.10 12.0.x 11.5.1 11.5.10 2 Issues in Oracle RDBMS Authentication 2 Oracle E-Business Suite vulnerabilities 8 vulnerabilities, SQL injection, XSS, information disclosure, etc. 11 vulnerabilities, SQL injection, XSS, information disclosure, etc. Critical Patch Update October 2005 11.0.x, 11.5.1 11.5.10 Default configuration issues Critical Patch Update July 2005 11.0.x, 11.5.1 11.5.10 SQL injection vulnerabilities and Information disclosure Critical Patch Update April 2005 11.0.x, 11.5.1 11.5.10 SQL injection vulnerabilities and Information disclosure Critical Patch Update Jan 2005 11.0.x, 11.5.1 11.5.10 SQL injection vulnerabilities Oracle Security Alert #68 Oracle 8i, 9i, 10g Buffer overflows Listener information leakage Oracle Security Alert #67 11.0.x, 11.5.1 11.5.8 10 SQL injection vulnerabilities Oracle Security Alert #56 11.0.x, 11.5.1 11.5.8 Buffer overflow in FNDWRR.exe Oracle Security Alert #55 11.5.1 11.5.8 Multiple vulnerabilities in AOL/J Setup Test Obtain sensitive information (valid session) Oracle Security Alert #53 10.7, 11.0.x 11.5.1 11.5.8 No authentication in FNDFS program Retrieve any file from O/S

Agenda How and Why Prevention Q&A 1 2 3 4 5 Targeted Attack Detection

Targeted Attack

Targeted Attack Advanced Persistent Threat (APT) Organized Crime State Sponsored Anonymous, LulzSec, Legion of Doom,

What are they after? Credit Card Fraud Credit Card Data Identify Theft/Tax Fraud Personally Identifiable Information (PII) Credit Card Number Primary Account Number (PAN) CVV/CV2/CID 3 digits on the back for Visa/MC 4 digits on the front for AMEX Magnetic Stripe Data First and last name Date of Birth Plus one of the following: Social security number Bank account number Financial account number Driver license or state ID number Health Insurance Fraud Health Information First and last name Plus one of the following (Protected Health Information) the past, present, or future physical or mental health, or condition of an individual provision of health care to an individual payment for the provision of health care to an individual

In 2013, the health care industry accounted for 44% of all breaches - Identity Theft Resource Center

What is your data worth? Credit Cards Credit Card Price Black Market Classification $20 $45 Freshly acquired $10 $12 Flooded $2 $7 Clearance ( stale data) Source: Krebs on Security

What is your data worth? Identify Theft $1 $5 First and last name Social Security number Tax information (e.g., 1099) $20 $40 $30 $100 First and last name Social Security number Current address Date of birth First and last name Social Security number Current address Date of birth Bank account number or credit card number Salary Human Resources Health care Payroll

FY 2013 1 million fraudulent tax returns FY 2013 $5.8 billion in fraudulent tax refunds Identity Protection PIN not available until Tax Year 2017 - General Accounting Office (GAO) Report Identity Protection PIN If you live in DC, Florida, or Georgia GET ONE NOW!

Database Valuation Calculate the black market value of the data contained in your database to help evaluate risk. Data Type Formula Credit Cards (number of unique, unexpired cards) * $10 Social Security Numbers (number of unique SSN + Name + DoB) * $20 or (number of unique SSN + Bank) * $50

Agenda How and Why Prevention Q&A 1 2 3 4 5 Targeted Attack Detection

Methods of Database Compromise Direct Direct compromise of the database through direct database access Obtain credentials to the database and escalate privileges Indirect Compromise is through an application, ancillary system, or operating system Application and ancillary system compromise most often will be SQL injection Operating system typically is theft of database files

Anatomy of the Targeted Attack 1 2 3 Point of Entry Persistence Lateral Movement Breach the perimeter network through a network compromise, phishing attack, or social engineering. Once inside, establish a beach-head and maintain the compromise over time (days, months, years). Expand the compromise to more devices and systems. 4 Asset and Data Discovery The Targeted Attack has already identified data of interest and will being searching for it. How to do this without detection? 5 Data Exfiltration Once the data of interest has been gathered, it must be transferred externally without being detected. How do you quietly steal gigabytes or terabytes of data?

Asset (Database) Discovery Techniques Passive Search internal knowledge repositories for architecture diagrams, design documents, code repositories, etc. Find TNSNAMES.ORA files Compromise DBA credentials through phishing or social engineering attacks Active Install malware on DBA machines and steal credentials, such as saved in SQL Developer Use Nmap to scan internal network for Oracle Databases on default port 1521 very noisy

Demo Search for TNSNAMES.ORA Files Findings tnsnames.ora files using internal search engines or wiki s www.google.com search: tnsnames filetype:ora site:.edu http://www.github.com

Demo Search Source Code Obtaining passwords from internal source code repositories www.github.com search: alter user identified by

Demo Decrypt SQL Developer Passwords Decrypt SQL Developer passwords https://github.com/tomecode/ show-me-password-sqldev-jdev Use extension in SQL Developer

Demo Scan for Databases on Port 1521 Using Nmap to find Oracle databases www.nmap.com nmap -st -sv -p 1521-1529 -T4 -v -n -Pn -open 192.168.2.11-50

Demo Brute Force SID Using Nmap to brute force SID www.nmap.com nmap -p 1521 -v --script oracle-sid-brute 192.168.56.10

Detect Brute Force SID listener.log <msg time='2015-04-13t10:28:44.192-04:00' org_id='oracle' comp_id='tnslsnr' type='unknown' level='16' host_id='testdb' host_addr='127.0.0.1'> <txt>13-apr-2015 10:28:44 * (CONNECT_DATA=(SID=ORCL1)(CID=(PROGRAM=)(HOST= jdbc )(USER=))) * (ADDRESS=(PROTOCOL=tcp)(HOST=192.168.56.1)(PORT=17927)) * establish * ORCL1 * 12505 </txt> </msg> <msg time='2015-04-13t10:28:44.192-04:00' org_id='oracle' comp_id='tnslsnr' type='unknown' level='16' host_id='testdb' host_addr='127.0.0.1'> <txt>tns-12505: TNS:listener does not currently know of SID given in connect descriptor </txt> </msg>

Default Oracle Password Statistics Database Account Default Password Exists in Database % Default Password % SYS CHANGE_ON_INSTALL 100% 3% SYSTEM MANAGER 100% 4% DBSNMP DBSNMP 99% 52% OUTLN OUTLN 98% 43% MDSYS MDSYS 77% 18% ORDPLUGINS ORDPLUGINS 77% 16% ORDSYS ORDSYS 77% 16% XDB CHANGE_ON_INSTALL 75% 15% DIP DIP 63% 19% WMSYS WMSYS 63% 12% CTXSYS CTXSYS 54% 32% * Sample of 120 production databases

Demo Brute forcing Oracle Database Passwords Integrigy internal tool google: oracle password cracker free tools: woraauthbf, orabf

Demo Using Nmap for Database Password Guessing www.nmap.com nmap -p 1521 -v --script oracle-brute --script-args oracle-brute.sid=orcl 192.168.56.10

Detect Password Brute Force Database Audit Trail OS_USERNAME USERNAME USERHOST TIMESTAMP ACTION ACTION_NAME RETURNCODE nmap_22032 ZX nmap_target 25-OCT-15 100LOGON 1017 nmap_18405 ZSA nmap_target 25-OCT-15 100LOGON 1017 nmap_20933 ZPB nmap_target 25-OCT-15 100LOGON 1017 nmap_16072 ZFA nmap_target 25-OCT-15 100LOGON 1017 nmap_3103 XTR nmap_target 25-OCT-15 100LOGON 1017 nmap_8908 YCAMPOS nmap_target 25-OCT-15 100LOGON 1017 nmap_26995 XNS nmap_target 25-OCT-15 100LOGON 1017 nmap_17004 YSANCHEZ nmap_target 25-OCT-15 100LOGON 28000 nmap_16306 XNM nmap_target 25-OCT-15 100LOGON 1017 nmap_24233 XNP nmap_target 25-OCT-15 100LOGON 1017 nmap_11503 SYSMAN nmap_target 25-OCT-15 100LOGON 1017 nmap_8458 XNI nmap_target 25-OCT-15 100LOGON 1017 nmap_11510 XNB nmap_target 25-OCT-15 100LOGON 1017 nmap_23924 XNC nmap_target 25-OCT-15 100LOGON 1017 nmap_10518 XLE nmap_target 25-OCT-15 100LOGON 1017 nmap_23234 XDO nmap_target 25-OCT-15 100LOGON 1017 nmap_23125 XLA nmap_target 25-OCT-15 100LOGON 28000

What Do I Need and How Did I Get It? IP Address Port SID/Service Name User Name Password Privileges 1. Scanning Nmap 2. TNSNAMES.ORA 3. Internal resources 1. Default port 1521 Nmap 2. TNSNAMES.ORA 3. Internal resources 1. TNSNAMES.ORA 2. Internal resources 3. SID brute force 1. Default user names (1,000+) 2. Inside the database (all_users) 3. Internal resources 1. Default passwords 2. Password guessing 3. Source code 1. Get lucky with an account 2. Missing security patches 3. Application vulnerabilities

TNS Poisoning Attack One-off April 30, 2012 Vuln # Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVE-2012-1675 Listener Oracle Net None Yes Base Score Access Vector Access Complexity CVSS VERSION 2.0 RISK Authentication Confidentiality Integrity Availability Last Affected Patch set (per Supported Release) 7.5 Network Low None Partial+ Partial+ Partial ALL VERSIONS This vulnerability is not patched by a SPU or PSU. The TNS Listener configuration must be secured. ALL VERSIONS of the Oracle Database are affected. 12c and 11.2.0.4 protected by default, but vulnerable when Valid Node Checking Registration (VNCR) is disabled.

TNS Poisoning Attack Illustrated Attacker TNS Proxy capture and inject Database TNS LISTENER PROD = localhost User SQL*NET App

TNS Poisoning Attack Illustrated Attacker TNS Proxy 1 Database TNS LISTENER 1 Attacker dynamically registers Service with database. capture and inject PROD = localhost User PROD = badguy_ip SQL*NET App

TNS Poisoning Attack Illustrated Attacker TNS Proxy Database TNS LISTENER Attacker dynamically registers Service with database. capture and inject User PROD = localhost PROD = badguy_ip 2 User connects and is Load Balanced to attacker. SQL*NET App 2

TNS Poisoning Attack Illustrated Attacker TNS Proxy capture and inject User SQL*NET App 3 4 Database TNS LISTENER PROD = localhost PROD = badguy_ip 3 Attacker dynamically registers Service with database. User connects and is Load Balanced to attacker. User connect to attacker rather than database. 4 Attacker forwards to database.

TNS Poisoning Attack Illustrated Attacker TNS Proxy capture and inject User SQL*NET App 1 3 4 2 Database TNS LISTENER PROD = localhost PROD = badguy_ip 1 2 3 Attacker dynamically registers Service with database. User connects and is Load Balanced to attacker. User connect to attacker rather than database. 4 Attacker forwards to database.

TNS Poisoning Mitigation Database Version SSL Encrypt with Cert COST class of secure transport VNCR Valid node checking registration References See ASO 1453883.1 1340831.1 (RAC) 1600630.1 8.1.7.x 10.2.0.3 10.2.0.3 10.2.0.5 11.1.0.x 11.2.0.1 11.2.0.3 11.2.0.4* (Enabled by default) 12.1.0.x* * 11.2.0.4 and 12c does not allow remote registration by default. (Enabled by default)

Demo TNS Poisoning Attack http://joxeankoret.com/research.html http://www.github.com

Exploit Information Joxean Koret http://joxeankoret.com/research.html Oracle TNS Poison un-auth proof on concept (Oracle 9i, 10g and 11g)/joxeankoret.com/research.html tnspoisonv1.py Used to poison the remote database listener proxy.py Proxy on attacker machine to accept client connections and forward to database server

Stealth Password Cracking Bug October 2012 Vuln # Component Protocol Package and/or Privilege Required Remote Exploit without Auth.? CVE-2012-3137 Oracle RDBMS Oracle Net None Yes Base Score Access Vector Access Complexity CVSS VERSION 2.0 RISK Authentication Confidentiality Integrity Availability Last Affected Patch set (per Supported Release) 10.0 Network Low None Complete Complete Complete 11.1.0.x 11.2.0.1 11.2.0.2 11.2.0.3 Vulnerable if using 11G passwords (see USER$). 10.2.0.x is also vulnerable if using Enterprise User Security (EUS) with an SHA-1 password verifier.

Stealth Password Attack Illustrated Flaw in the 11g O5Logon protocol allows for brute forcing of the password using the authsess_key. Attacker Database 4 SQL*Net Trace capture auth_sesskey Password Cracker brute force auth_sesskey 1 2 3 connect to SID send <username> receive auth_sesskey auth_sesskey = AES encrypt clear-text session key using user 11g password hash

Exploit Information SQL*Net Trace on client Capture SQL*Net connection and auth_sesskey TRACE_LEVEL_CLIENT = SUPPORT nmap Legendary network scanning tool oracle-brute-stealth script Retrieves auth_sesskey for selected users John the Ripper Legendary password cracking tool Use o5logon

Commonly Used Oracle Attack Tools Metasploit Oracle Modules SID brute force, password guessing, privilege escalation modules Nmap network scanning, SID brute force, password guessing modules ODAT (Oracle Database Attack Tool) SID brute force, password guessing, privilege escalation features

Agenda How and Why Prevention Q&A 1 2 3 4 5 Targeted Attack Detection

Integrigy s #1 Security Recommendation Limit direct database access whenever possible Much harder to hack database if an attacker can not connect to it can t connect, can t hack it Would have to use another avenue such as a web application or reporting tool (e.g., OBIEE) Use firewalls in front of data center, network ACLs, TNS invited nodes, Oracle Connection Manager, Oracle Database Firewall, etc. DBAs should use bastion hosts to manage databases

Database Security Preventative Controls Check for default and weak passwords constantly Use multiple tools to check passwords Install database profiles to enforce strong passwords Harden database configurations Develop comprehensive database security standard Validate configurations on regular basis Apply Oracle Critical Patch Updates on a regular basis on all databases Reduce risk of compromise and escalation of privileges

How to Check Database Passwords Use Oracle s DBA_USERS_WITH_DEFPWD Limited set of accounts Single password for each account Command line tools (orabf, etc.) Command line only not easy to use Integrigy AppSentry 1. Checks all database accounts 2. Uses passwords lists - > 1 million passwords 3. Allows custom passwords

Agenda How and Why Prevention Q&A 1 2 3 4 5 Targeted Attack Detection

Framework for Auditing and Logging Payment Card (PCI DSS) SOX (COBIT) HIPAA (NIST 800-66) FISMA (NIST 800-53) IT Security (ISO 27001) Foundation security events and actions (logins, logoffs, account creation, privileges, etc.) Database Application Native Auditing Syslog DB log files Signon AuditTrails Navigation Centralized Logging Solution Protected Audit Data Alerting & Monitoring Reporting Correlation Framework for Auditing and Logging

Foundation Security Events and Actions The foundation of the framework is a set of key security events and actions derived from and mapped to compliance and security requirements that are critical for all organizations. E1 - Login E2 - Logoff E3 - Unsuccessful login E4 - Modify auth mechanisms E5 - Create user account E6 - Modify user account E7 - Create role E8 - Modify role E9 - Grant/revoke user privileges E10 - Grant/revoke role privileges E11 - Privileged commands E12 - Modify audit and logging E13 - Create, Modify or Delete object E14 - Modify configuration settings

Foundation Security Events Mapping Security Events and Actions PCI DSS 10.2 SOX (COBIT) HIPAA (NIST 800-66) IT Security (ISO 27001) FISMA (NIST 800-53) E1 - Login 10.2.5 A12.3 164.312(c)(2) A 10.10.1 AU-2 E2 - Logoff 10.2.5 DS5.5 164.312(c)(2) A 10.10.1 AU-2 E3 - Unsuccessful login 10.2.4 DS5.5 164.312(c)(2) A 10.10.1 A.11.5.1 AC-7 E4 - Modify authentication mechanisms 10.2.5 DS5.5 164.312(c)(2) A 10.10.1 AU-2 E5 Create user account 10.2.5 DS5.5 164.312(c)(2) A 10.10.1 AU-2 E6 - Modify user account 10.2.5 DS5.5 164.312(c)(2) A 10.10.1 AU-2 E7 - Create role 10.2.5 DS5.5 164.312(c)(2) A 10.10.1 AU-2 E8 - Modify role 10.2.5 DS5.5 164.312(c)(2) A 10.10.1 AU-2 E9 - Grant/revoke user privileges 10.2.5 DS5.5 164.312(c)(2) A 10.10.1 AU-2 E10 - Grant/revoke role privileges 10.2.5 DS5.5 164.312(c)(2) A 10.10.1 AU-2 E11 - Privileged commands 10.2.2 DS5.5 164.312(c)(2) A 10.10.1 AU-2 E12 - Modify audit and logging 10.2.6 DS5.5 164.312(c)(2) A 10.10.1 E13 - Objects Create/Modify/Delete 10.2.7 DS5.5 164.312(c)(2) A 10.10.1 AU-2 AU-9 AU-2 AU-14 E14 - Modify configuration settings 10.2.2 DS5.5 164.312(c)(2) A 10.10.1 AU-2

Foundation Database Logging Object Oracle Audit Statement Resulting Audited SQL Statements Session session Database logons and failed logons Users Roles Database Links Public Database Links user role database link public database link System alter system alter system create user alter user drop user create role alter role drop role create database link drop database link create public database link drop public database link Database alter database alter database Grants grant system grant (system privileges and roles) revoke create profile Profiles profile alter profile drop profile SYSDBA and SYSOPER sysdba sysoper All SQL executed with sysdba and sysoper privileges

Detecting Attacks IP Address Port SID User Name Password Privileges 1. Scanning Nmap 2. TNSNAMES.ORA 3. Internal resources 1. Default port 1521 Nmap 2. TNSNAMES.ORA 3. Internal resources 1. TNSNAMES.ORA 2. Internal resources 3. SID brute force 1. Default user names (1,000+) 2. Inside the database (all_users) 3. Internal resources 1. Default passwords 2. Password guessing 3. Source code 1. Get lucky with an account 2. Missing security patches 3. Application vulnerabilities Network intrusion detection (IDS) Network intrusion detection (IDS) Monitor listener logs for SID and service name errors Alert on any use of standard accounts like CTXSYS Monitor for logins to locked accounts Watch for horizontal and vertical failed password attempts Monitor for common security errors Monitor for security vulnerability exploits

Agenda How and Why Prevention Q&A 1 2 3 4 5 Targeted Attack Detection

Contact Information Stephen Kost Chief Technology Officer Integrigy Corporation web: www.integrigy.com e-mail: info@integrigy.com blog: integrigy.com/oracle-security-blog youtube: youtube.com/integrigy