SlideShare ist ein Scribd-Unternehmen logo
1 von 35
IN THE NAME OF GOD
Top 10 database attacks
MB Bahador
TOP 10 DATABASE ATTACKS
1. Excessive privileges
2. Privilege abuse
3. Unauthorized privilege elevation
4. Platform vulnerabilities
5. SQL injection
6. Weak audit
7. Denial of service
8. Database protocol vulnerabilities
9. Weak authentication
10.Exposure of backup data
PLATFORM VULNERABILITIES
Vulnerabilities in underlying operating
systems may lead to unauthorized data
access.
PLATFORM VULNERABILITIES
Vulnerabilities in underlying operating systems
(Windows 2000, UNIX, etc.) and additional services
installed on a database server may lead to
unauthorized access, data corruption, or denial of
service.
PLATFORM VULNERABILITIES
Slammer worm on Windows machines
running MS SQL Server
PLATFORM VULNERABILITIES
 Aliases: SQL Slammer,
W32.SQLExp.Worm
 Released: January 25, 2003, at
about 5:30 a.m. (GMT)
 Fastest worm in history
 Spread world-wide in under 10 minutes
 Doubled infections every 8.5 seconds
 376 bytes long
PLATFORM VULNERABILITIES
 Platform:Microsoft SQL Server 2000
 Vulnerability: Buffer overflow
 Patch available for 6 months
 Propagation: Single UDP packet
PLATFORM VULNERABILITIES
 Infected between 75,000 and 160,000
systems
 Disabled SQL Server databases on infected
machines
 Saturated world networks with traffic
 Disrupted Internet connectivity world-wide
PLATFORM VULNERABILITIES
 Disrupted financial institutions
 Airline delays and cancellations
 Affected many U.S. government and
commercial websites
PLATFORM VULNERABILITIES
 13,000 Bank of America ATMs stopped
working
 Continental Airlines flights were cancelled
and delayed; ticketing system was
inundated with traffic. Airport self-check-in
kiosks stopped working
 Activated Cisco router bugs at Internet
backbones
PLATFORM VULNERABILITIES
 Single UDP packet
 Targets port 1434 (Microsoft-SQL-Monitor)
 Causes buffer overflow
 Continuously sends itself via UDP packets to
pseudo-random IP addresses, including broadcast
and multicast addresses
 Does not check whether target machines exist
PLATFORM VULNERABILITIES
PLATFORM VULNERABILITIES
PLATFORM VULNERABILITIES
PLATFORM VULNERABILITIES
PLATFORM VULNERABILITIES
PLATFORM VULNERABILITIES
 Reconstructs session from buffer overflow
 Obtains (and verifies!) Windows API
function addresses
 Initializes pseudo-random number
generator and socket structures
 Continuously generates random IP
addresses and sends UDP data-grams of
itself
Reconstruct
session
Get
Windows
API
addresses
Initialize
PRNG and
socket
Send
Packets
Buffer
Overflow
PLATFORM VULNERABILITIES
The Blaster worm took advantage of a Windows
2000 vulnerability to take down target
servers.(create denial of service conditions)
PLATFORM VULNERABILITIES
 Also known as Lovsan, Poza, Blaster.
 First detected on August 11, 2003
 Exploits the most widespread Windows flaw ever
 A vulnerability in Distributed Component Object
Model (DCOM) that handles communication using
Remote Procedure Call (RPC) protocol
PLATFORM VULNERABILITIES
 Affects Windows 2000 and Windows XP
 Two messages in the code:
1. “I just want to say LOVE YOU SAN!””
2. “billy gates why do you make this possible? Stop
making money and fix your software!!”
 Infected more than 100,000 computers in 24 hours
PLATFORM VULNERABILITIES
 Detected in mid-July 2003
 RPC protocol allow a program to run code
on a remote machine
 Incorrectly handles malformed messages on
RPC port 135, 139, 445, 593
 Attackers send special message to remote
host
 Gain local privilege, run malicious code
PLATFORM VULNERABILITIES
Vulnerability Scorecard Report
Published: March 2011
This study leverages data from the National
Vulnerability Database (NVD), the industry
standard source of security vulnerability
data.
PLATFORM VULNERABILITIES
Consequence
 Server is compromised
 Direct access to database files
 Local access through admin roles
 Install backdoors
PLATFORM VULNERABILITIES
Mitigation
 Network ACLs: Simple FW to allow access only to
required services
 Network IPS: Traditional detection of known
vulnerabilities
IPS tools are a good way to identify and/or block attacks
designed to exploit known database platform vulnerabilities.
REFERENCE
 eEye Digital Security.
http://www.eeye.com/html/Research/Flash/sapphire.txt
 Cooperative Association for Internet Data Analysis
(CAIDA)
http://www.caida.org/outreach/papers/2003/sapphire/sapphi
re.html
 Internet Storm Center.
http://isc.incidents.org/analysis.html?id=180

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

098
098098
098
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
 
Backdoor
BackdoorBackdoor
Backdoor
 
Owasp universal-http-do s
Owasp universal-http-do sOwasp universal-http-do s
Owasp universal-http-do s
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Web backdoors attacks, evasion, detection
Web backdoors   attacks, evasion, detectionWeb backdoors   attacks, evasion, detection
Web backdoors attacks, evasion, detection
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Cruda, mayday pp tx 2
 Cruda, mayday pp tx 2 Cruda, mayday pp tx 2
Cruda, mayday pp tx 2
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Top 10 Latest Viruses
Top 10 Latest VirusesTop 10 Latest Viruses
Top 10 Latest Viruses
 
Linux Virus
Linux VirusLinux Virus
Linux Virus
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
 
Trojan
TrojanTrojan
Trojan
 
Kali linux and hacking
Kali linux  and hackingKali linux  and hacking
Kali linux and hacking
 
Qualys Threads
Qualys ThreadsQualys Threads
Qualys Threads
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networks
 
EvilDuino
EvilDuinoEvilDuino
EvilDuino
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
 

Ähnlich wie Data Base Attack

5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
drewz lin
 
Rootkit&honeypot aalonso-dcu-dec09
Rootkit&honeypot aalonso-dcu-dec09Rootkit&honeypot aalonso-dcu-dec09
Rootkit&honeypot aalonso-dcu-dec09
Angelill0
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
 

Ähnlich wie Data Base Attack (20)

5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Hacking Exposed LIVE: Attacking in the Shadows
Hacking Exposed LIVE: Attacking in the ShadowsHacking Exposed LIVE: Attacking in the Shadows
Hacking Exposed LIVE: Attacking in the Shadows
 
Malware
MalwareMalware
Malware
 
IBPS SO
IBPS SOIBPS SO
IBPS SO
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Infosec
InfosecInfosec
Infosec
 
Rootkit&honeypot aalonso-dcu-dec09
Rootkit&honeypot aalonso-dcu-dec09Rootkit&honeypot aalonso-dcu-dec09
Rootkit&honeypot aalonso-dcu-dec09
 
Blast off!
Blast off!Blast off!
Blast off!
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytesnull Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
 هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme... هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
security.pdf
security.pdfsecurity.pdf
security.pdf
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Data Base Attack