EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Similar documents
CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

(WAPT) Web Application Penetration Testing

The Top Web Application Attacks: Are you vulnerable?

Professional Penetration Testing Techniques and Vulnerability Assessment ...

How I hacked PacketStorm ( )

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

HTTPParameter Pollution. ChrysostomosDaniel

CYBERTRON NETWORK SOLUTIONS

Certified Ethical Hacker Exam Version Comparison. Version Comparison

SQL Injection January 23, 2013

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

SQL Injection. The ability to inject SQL commands into the database engine through an existing application

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

AUTOMATE CRAWLER TOWARDS VULNERABILITY SCAN REPORT GENERATOR

Rational AppScan & Ounce Products

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Security Assessment of Waratek AppSecurity for Java. Executive Summary

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

EC Council Certified Ethical Hacker V8

CEH Version8 Course Outline

Network Threats and Vulnerabilities. Ed Crowley

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

Web Application Report

Web Application Attacks And WAF Evasion

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Web Application Security

Penetration Testing Report Client: Business Solutions June 15 th 2015

Ficha técnica de curso Código: IFCPR140c. SQL Injection Attacks and Defense

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Testing Web Applications for SQL Injection Sam Shober

What? Me, Worry? I've Already Been Hacked. Haven't You?

How To Fix A Web Application Security Vulnerability

SQL Injection Attacks: Detection in a Web Application Environment

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

BLIND SQL INJECTION (UBC)

Offensive Security. Advanced Web Attacks and Exploitation. Mati Aharoni Devon Kearns. v. 1.0

VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso

Web App Security Audit Services

Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

10 Things Every Web Application Firewall Should Provide Share this ebook

5 Steps to Advanced Threat Protection

Manipulating Microsoft SQL Server Using SQL Injection

Guidelines for Web applications protection with dedicated Web Application Firewall

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

McAfee Certified Assessment Specialist Network

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Learn Ethical Hacking, Become a Pentester

Web Vulnerability Scanner by Using HTTP Method

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

CRYPTUS DIPLOMA IN IT SECURITY

Penetration Testing with Kali Linux

Analysis of SQL injection prevention using a proxy server

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

Hackers are here. Where are you?

The Web AppSec How-to: The Defenders Toolbox

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Last update: February 23, 2004

WebCruiser Web Vulnerability Scanner User Guide

Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist

External Network & Web Application Assessment. For The XXX Group LLC October 2012

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Common Security Vulnerabilities in Online Payment Systems

Where every interaction matters.

Hacker Intelligence Initiative, Monthly Trend Report #15

Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications

Network Security Audit. Vulnerability Assessment (VA)

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Check list for web developers

How We're Getting Creamed

SQL Injection. By Artem Kazanstev, ITSO and Alex Beutel, Student

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Penetration Testing in Romania

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

SANDCAT THE WEB APPLICATION SECURITY ASSESSMENT SUITE WHAT IS SANDCAT? MAIN COMPONENTS. Web Application Security

Webapps Vulnerability Report

Newsletter - September T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

LINUX / INFORMATION SECURITY

Web Application Security

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

[CEH]: Ethical Hacking and Countermeasures

5 Simple Steps to Secure Database Development

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

Penetration: from Application down to OS

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Transcription:

CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference

About Center of Advanced Security Training () The rapidly evolving information security landscape now requires professionals to stay up to date on the latest security technologies, threats and remediation strategies. was created to address the need for quality advanced technical training for information security professionals who aspire to acquire the skill sets required for their job functions. courses are advanced and highly technical training programs co-developed by and well-respected industry practitioners or subject matter experts. aims to provide specialized training programs that will cover key information security domains, at an advanced level.

Advanced SQLi Attacks and Countermeasures Course Description SQL injection is the most commonly used attack to break the security of a web application. According to NTT s Global Threat Intelligence Report (GTIR), cost for a 'minor' SQL injection attack exceeds $196,000. Database usage is on the rise, as well as the applications that interconnect databases, which makes SQL injection one of the top concern for IT security professionals. SQL injection takes advantage of non-validated input vulnerabilities and injects SQL commands through a web application that are executed in a back-end database. Attackers use this technique to either gain unauthorized access to a database or to retrieve information directly from the database. Attackers can use the SQLi attacks to steal sensitive data, spoof identity, tamper database records, reveal database structure, delete entire DB, execute system commands, elevate privileges and compromise the whole system, perform DoS attack on the server, etc. Advanced SQLi Attacks and Countermeasures course provides in-depth knowledge on different types of SQL injection techniques, how to detect vulnerabilities, automated SQL injection tools and various countermeasures to protect web application from attacks.

What Will You Learn? After completing this course, students will learn: 01 Fundamentals of how web applications, and server-side technologies work 02 Working of SQL injection attacks 03 SQL injection attack techniques, including error based, and blind SQL injections 04 Union exploitation technique 05 Different types of blind SQL injection attacks

06 How to detect SQL injection vulnerability 07 Testing for SQL injection and black-box pen testing techniques 08 Automated SQL injection vulnerability scanners 09 How to enumerate databases 10 Exploiting authentication vulnerabilities and launching Cross-Site Scripting (XSS) attacks 11 Compromise the network using SQL injection 12 Automated SQL Injection tools 13 SQL injection techniques to bypass filter, WAF, and IDS 14 How to defend against SQL injection attacks 15 Investigating and handling SQL attack incidents

Who Should Attend Database administrators Web app developers Security auditors Security professionals Duration 3 days (9:00 5:00)

Course Outline Module 01: Introduction to SQL Injection Attacks What Is SQL Injection? Example 5: Identifying the Table Name Why Bother about SQL Injection? Example 6: Deleting a Table SQL Injection Attacks SQL Injection Attack Categories How Web Applications Work Getting Private Info Server-side Technologies Types of SQL Injection HTTP Post Request Error Based SQL Injection Example 1: Normal SQL Query Error Based SQL Injection Techniques Example 1: SQL Injection Query Blind SQL Injection Example 1: Code Analysis No Error Messages Returned Example 2: BadProductList.aspx Blind SQL Injection: WAITFOR DELAY YES Example 2: Attack Analysis Example 3: Updating Table Example 4: Adding New Records or NO Response Blind SQL Injection: Boolean Exploitation technique

Module 02: SQL Injection Attack Methodology Information Gathering Extracting Information through Error Messages Understanding SQL Query SQL Injection Vulnerability Detection SQL Injection Detection SQL Injection Error Messages SQL Injection Attack Characters Additional Methods to Detect SQL Injection SQL Injection Black Box Pen Testing Testing for SQL Injection Code Review to Detect SQL Injection Vulnerabilities Perform Error based SQL injection Error Based Exploitation Technique Union Exploitation Technique Perform Error based SQL Injection: Using Union SQL Injection Bypass Website Logins Using SQL Injection Perform Blind SQL injection Blind SQL Injection Exploitation (MySQL) Blind SQL Injection - Extract Database User Blind SQL Injection - Extract Database Name Blind SQL Injection - Extract Column Name Blind SQL Injection - Extract Data from ROWS Exploiting Second-Order SQL Injection Second-Order SQL Injection: Scenario Finding Second-Order Vulnerabilities Finding Second-Order Vulnerabilities: Automated Scanners Steps to Identify Second-Order SQL Injection Vulnerabilities Exploiting Client-Side SQL Injection Attacking Client-Side Databases Using Hybrid Attacks Leveraging Captured Data Creating Cross-Site Scripting Running Operating System Commands on Oracle Exploiting Authenticated Vulnerabilities Enumerate Data Database, Table, and Column Enumeration Advanced Enumeration Creating Database Accounts Password Grabbing Grabbing SQL Server Hashes Extracting SQL Hashes (In a Single Statement) Transfer Database to Attacker s Machine Interact with the OS Interacting with the Operating System Interacting with the File System Compromise the Network Network Reconnaissance Using SQL Injection Network Reconnaissance Full Query Automated SQL Injection Tools

Module 03: Bypassing Filter, WAF, and IDS Evading Input Filters Using Case Variation Using SQL Comments Using URL Encoding Using Dynamic Query Execution Using Null Bytes Using Nesting Stripped Expressions Exploiting Truncation Using Non-Standard Entry Points Introduction to WAF Methods to Bypass WAF Bypassing WAF: SQL Injection - Normalization Bypassing WAF: SQL Injection - HTTP Parameter Pollution (HPP) Bypassing WAF: SQL Injection HTTP Parameter Fragmentation (HPF) Bypassing WAF: Blind SQL Injection Bypassing WAF: SQL Injection Signature Bypass PHPIDS (0.6.1.1) default rules Mod_Security (2.5.9) default rules Evading IDS Types of Signature Evasion Techniques Evasion Technique: Sophisticated Matches Evasion Technique: Hex Encoding Evasion Technique: Manipulating White Spaces Evasion Technique: In-line Comment Evasion Technique: Char Encoding Evasion Technique: String Concatenation Evasion Technique: Obfuscated Codes

Module 04: SQL Injection Defenses and Incident Handling How to Defend Against SQL Injection Attacks SQL Injection Detection Tools Investigating and Handling SQL Attack Incidents Investigating a Suspected SQL Injection Attack Analyzing Digital Artifacts Containing the Incident Assessing the Data Involved Determining the Actions Performed by the Attacker on the System Recovering from a SQL Injection Attack Reducing the Attack Surface

Master Trainer: Haja Mohideen VP- TECHNOLOGY, EC- COUNCIL Mr. Haja Mohideen is the VP- Technology and Co-Founder of. He manages the certifications and training programs for, and leads the product development team. He is known worldwide as the creator of the popular certification programs Certified Ethical Hacker (C EH), Computer Hacking Forensics Investigator (CHFI), Certified System Analyst / Licensed Penetration Tester (ECSA/LPT) and Certified Secure Programmer (ECSP), among others. Haja has 17 years of experience specializing in the development, support and project management of PC software and hardware. He has trained various Fortune 500 companies as well as US government agencies. He is also the Master Trainer for courses, and his training is often sought after globally. He has led training in many countries including Greece, India, USA, Indonesia, Singapore, England, Mexico, amongst others. Haja is also one of few who are qualified to conduct train the trainer sessions for courses. Haja holds a Masters Degree in Software Engineering and has numerous industry-wide IT certifications from Microsoft, IBM, Cisco, Motorola, 3COM, Adobe, Intel and many others. He carries over 90 vendor certifications.