1. Trang chủ
  2. » Công Nghệ Thông Tin

CEHv6 module 42 hacking database servers

36 240 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Hacking Database Servers
Trường học EC-Council
Chuyên ngành Ethical Hacking
Thể loại Module
Năm xuất bản 2025
Thành phố Albuquerque
Định dạng
Số trang 36
Dung lượng 1,02 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Hacking Database Servers Module XLII Page | 3275 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council EC-Council All Rights Reserved.. Hacking Database Servers Module XLII Pa

Trang 1

Hacking Database Servers

Module XLII Page | 3273 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council

Ethical Hacking and CountermeasuresVersion 6

Module XLIIHacking Database Servers

Ethical Hacking and Countermeasures v6

Module XLII: Hacking Database Servers

Exam 312-50

Trang 2

Hacking Database Servers

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Trang 3

Hacking Database Servers

Module XLII Page | 3275 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Ten Hacker Tricks to Exploit

How SQL Server is Hacked

 Ten Hacker Tricks to Exploit

 How a SQL Server is Hacked

 Tools

Trang 4

Hacking Database Servers

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Trang 5

Hacking Database Servers

Module XLII Page | 3277 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Introduction

Databases are the heart of a commercial website

An attack on database servers can cause a great monetary loss for the company

Database servers are usually hacked to get the critical information

Mistakes made by the web designers can reveal the databases of the server to the hacker

Source: http://neworder.box.sk/newsread.php?newsid=7703

Databases are the central part of any website and are frequently targeted for database attacks Attacks on database can bring huge loss to the organization Most databases are hacked to derive critical information such as credit card numbers, account number, and their passwords

Most databases get hacked due to poor web design Small mistakes in the web design make it vulnerable to attack Attacker exploits this vulnerability and derives the critical information from the database An attack on any commercial website can bring down company’s reputation and customers may lose their faith Most databases are hacked using the web browsers

Trang 6

Hacking Database Servers

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Hacking Oracle Database Server

Trang 7

Hacking Database Servers

Module XLII Page | 3279 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Attacking Oracle

An Oracle database server on network is found by using TCP port scan Once the Oracle database server has been traced, the first port of call is made to the TNS Listener Using PL/SQL Injection, attackers can potentially elevate their level of privilege from a low-level PUBLIC account to an account with DBA-level privileges

After getting the DBA privileges, an attacker can do anything with the database An attacker can steal the personal information of the users, and can use it for wrong purposes

Trang 8

Hacking Database Servers

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Security Issues in Oracle

SQL Injection

SQL Manipulation

Code Injection Attack

Buffer Overflow

Security Issues in Oracle

The security issues found in Oracle are as follows:

 SQL Injection: A SQL injection attack uses non-validated input vulnerabilities to perform SQL injection Attacker sends malicious SQL commands through a web application that are executed in a back-end database Programmers use sequential SQL commands with client supplied parameters making it easier for attackers to inject commands Attackers can easily execute random SQL queries on the database server through a web application

 SQL Manipulation: The SQL manipulation technique gives the authorized privilege of valid users to the attacker to access the database With the help of this attack, an attacker can make a backdoor entry to the database

 Code Injection Attack: With the help of code injection attacks, attackers try to add extra SQL statements or commands to the existing SQL statement This attack is mostly done against SQL server application’s EXECUTE statement

 Buffer Overflow: Buffer overflows in database occur in standard functions such as, bfilename,to_timestamp_tz, and tz_offset, and which can be exploited using a

bfilename,to_timestamp_tz, and tz_offset are used to execute buffer overflow attack

Trang 9

Hacking Database Servers

Module XLII Page | 3281 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Types of Database Attacks

Excessive privileges:

• When users (or applications) are granted database privileges that exceed the requirements of their job function, these privileges may be used to gain access

to confidential information

• Query-level access control as it restricts privileges to minimum-required operations and data

Solution:

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Types of Database Attacks

Solution:

EC-Council

All Rights Reserved Reproduction is Strictly Prohibited

Types of Database Attacks

(cont’d)

• IPS tools are a good way to identify and/or block attacks designed to exploit known database platform

vulnerabilities Solution:

Platform vulnerabilities:

• Vulnerabilities in underlying operating systems may lead to unauthorized data access and corruption

Trang 10

Hacking Database Servers

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Types of Database Attacks

Exposure of backup data:

• Some recent high profile attacks have involved theft of database backup tapes and hard disks

Types of Database Attacks

 Excessive privileges: When excessive database privileges are provided to a user or application than required, they may be used to gain access to confidential information Consider an example, where a university administrator whose job requires read-only permission to read student’s records, may take advantage of unnecessary privileges to change the grades of the student records

Solution: The key to this problem (apart from hiring good policies) is a query-level access control Query-level access control limits privileges to minimum-required operations and data

 Privilege abuse: For the purpose of the legitimate data, some users may misuse the data access privileges Consider the example, where a user has permissions to view individual patient’s records via a custom healthcare application A client may wrongfully use that privilege to access all patient records via a MS-Excel client Users may misuse privileges for unauthorized access to all records

Solution: The key to this problem is to apply access control policies to what and how the data is accessed Users abusing access privileges can be identified by applying policies for:

o Time of day

o Location

o Application client and volume of data retrieved

 Platform vulnerabilities: Hidden vulnerabilities in operating systems may lead to unauthorized data access and corruption For example, the Blaster worm took advantage

of Windows 2000 vulnerability and brought down the target servers

Solution: The best way to identify and/or block these kinds of attacks is to use IPS tools that are designed to exploit known database platform vulnerabilities

 Denial-of-service: Denial-of-service (DoS) can be carried by using techniques of:

o Buffer overflows

o Data Corruption

o Network Flooding

Trang 11

Hacking Database Servers

Module XLII Page | 3283 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council

 Database protocol vulnerabilities: If a database is vulnerable, corruption and unauthorized data access may occur

Solution: Parsing and validating SQL communication can stop protocol attacks

 Exposure of backup data: New high profile attacks have come into theft of database backup tapes and hard disks

Solution: Encrypt all the backups

Trang 12

Hacking Database Servers

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

How to Break into an Oracle Database and Gain DBA Privileges

New databases made with a create database command are installed with a user called OUTLN

This schema is used to hold information about stored outlines for the plan stability feature

User has an easily guessable password and is left unlocked when database is created

DBAs commonly overlook this but it is so important to either change the password or lock the account because it can be used to gain DBA privileges

The critical system privilege granted by default to the OUTLN user is EXECUTE ANY PROCEDURE

If you can execute any procedure in the database, then try this one, and look for the privileges you can gain

How to Break into an Oracle Database and Gain DBA Privileges

Source: http://www.quest-pipelines.com/pipelines/dba/tips04.htm

New databases are created using the create database command and are installed with a user called OUTLN that stores information about the stored outlines After creating the database, DBA’s neglect to change the password and lock the database account Users can easily guess the password to gain DBA privileges Below the procedure is shown:

$ sqlplus outln/xxxx@DEMO

SQL*Plus: Release 9.2.0.3.0 - Production on Thu Sep 4 13:58:14 2003Copyright (c) 1982, 2002, Oracle Corporation All rights reserved

Connected to:

Oracle9i Enterprise Edition Release 9.2.0.3.0 - 64bit Production

With the Partitioning, OLAP and Oracle Data Mining options

JServer Release 9.2.0.3.0 - Production

SQL> select * from session_privs;

Trang 13

Hacking Database Servers

Module XLII Page | 3285 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council

PL/SQL procedure successfully completed

SQL> select * from session_privs;

CREATE ANY TABLE

ALTER ANY TABLE

DROP ANY TABLE

COMMENT ANY TABLE

SELECT ANY TABLE

INSERT ANY TABLE

UPDATE ANY TABLE

DELETE ANY TABLE

CREATE CLUSTER

CREATE ANY CLUSTER

ALTER ANY CLUSTER

DROP ANY CLUSTER

CREATE ANY INDEX

ALTER ANY INDEX

DROP ANY INDEX

CREATE SYNONYM

Trang 14

Hacking Database Servers

CREATE ANY SYNONYM

DROP ANY SYNONYM

CREATE PUBLIC SYNONYM

DROP PUBLIC SYNONYM

CREATE VIEW

CREATE ANY VIEW

DROP ANY VIEW

CREATE SEQUENCE

CREATE ANY SEQUENCE

ALTER ANY SEQUENCE

DROP ANY SEQUENCE

CREATE DATABASE LINK

CREATE PROCEDURE

CREATE ANY PROCEDURE

ALTER ANY PROCEDURE

DROP ANY PROCEDURE

EXECUTE ANY PROCEDURE

CREATE TRIGGER

CREATE ANY TRIGGER

ALTER ANY TRIGGER

DROP ANY TRIGGER

CREATE ANY SNAPSHOT

ALTER ANY SNAPSHOT

DROP ANY SNAPSHOT

CREATE TYPE

CREATE ANY TYPE

ALTER ANY TYPE

DROP ANY TYPE

CREATE OPERATOR

CREATE ANY OPERATOR

DROP ANY OPERATOR

CREATE INDEXTYPE

CREATE ANY INDEXTYPE

DROP ANY INDEXTYPE

54 rows selected

Trang 15

Hacking Database Servers

Module XLII Page | 3287 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Oracle Worm: Voyager Beta

Voyager Beta worm attacks Oracle servers using default accounts and passwords

It snarfs the local IP address, lops off the last octet and replaces it with the value of ‘220’

It attempts a TCP connection to TCP port 1521, where the Oracle connection service listens

It then tries a series of usernames and passwords:

'system'/'manager', 'sys'.'change_on_install', 'dbsnmp'/'dbsnmp', 'outln'/'outln',

'scott'/'tiger', 'mdsys'/'mdsys', 'ordcommon'/'ordcommon‘

If it can authenticate, create table 'X' with column 'Y‘; it does not appear to transfer the payload

Oracle Worm: Voyager Beta

Source: http://www.wormblog.com/2005/11/oracle_worm_in_.html

The Voyager Beta worm uses default accounts and passwords to attack Oracle servers

 Voyager Beta grabs the local IP address, changes the last octet, and replaces it with '220' For example, if local Oracle server is 1.2.3.4, it will start with 1.2.3.220

 It attempts and establishes a TCP connection to TCP port 1521, where the Oracle connection service listens

 After it establishes a connection, it tries a sequence of usernames and passwords, such as: 'system'/'manager', ’sys’.'change_on_install',

Trang 16

Hacking Database Servers

EC-Council

All Rights Reserved Reproduction is Strictly Prohibited

Hacking SQL Server

Trang 17

Hacking Database Servers

Module XLII Page | 3289 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Ten Hacker Tricks to Exploit SQL Server Systems

• Direct Connections via the Internet

• Perusing Web site source code

The following are the tricks to exploit SQL Server systems:

Ten Hacker Tricks to Exploit SQL Server Systems

Source:

http://searchsqlserver.techtarget.com/tip/1,289483,sid87_gci1165052_tax301336,00.html?Off er=SQLwnha217

The hacker’s tricks and methods to exploit SQL server systems:

 Direct Connections via the Internet: An SQL server without any firewall protection can be accessed easily without any permission via direct connections to Internet According to DShield's Port Report, there are many servers without any firewall protection that become targets for database attacks These attacks are mostly done using the SQL Slammer worm These attacks can make way to DoS, buffer overflow, etc

 Vulnerability scanning: Weaknesses in the OS, web application, or database system are exposed if a vulnerability scan is performed Malicious users or attackers use open source or commercial tools, or perform manual attack from command prompt leading database server to compromise Use vulnerability assessment tools like:

o QualysGuard for general scanning

o WebInspect, SPI Dynamics (for web application scanning)

o Next Generation Security Software Ltd.'s NGSSquirrel for SQL Server (for specific scanning)

database-The figure below shows some SQL injection vulnerabilities that can be uncovered:

Figure: Common SQL injection vulnerabilities found using WebInspect

Trang 18

Hacking Database Servers

 Enumerating the SQL Server Resolution Service: Hidden database instances can

be extracted if SQL Server is run on UDP port 1434 SQLPing tool is used to find SQL Server system(s) and extract their version numbers It can also lead to buffer overflow attack

 Cracking SA passwords: Attackers crack SA passwords to get into SQL Server databases SQLPing, AppDetective, and NGSSQLCrack tools are used to crack the SA passwords

 Direct-exploit attacks: While scanning a system or a database server for vulnerabilities, direct attacks can be performed by using tools such as Metasploit, CANVAS, and CORE IMPACT Direct attacks during vulnerability scanning are referred

to as silver-bullet hack Attackers use this attack to perform code injection or to gain unauthorized command-line access

Figure: SQL server vulnerability exploitable using Metasploit's MSFConsole

 SQL injection: By using malicious input such as malformed SQL queries, SQL injection attacks can be performed through web applications (front-end) After executing or inserting malicious input to the web application, it returns informative errors and the command being executed After a vulnerability scan, if any SQL injection vulnerability is identified, an SQL injection attack can be done using an automated tool like SQL Injector

Ngày đăng: 26/12/2013, 21:01

TỪ KHÓA LIÊN QUAN