SlideShare uma empresa Scribd logo
1 de 35
IN THE NAME OF GOD
Top 10 database attacks
MB Bahador
TOP 10 DATABASE ATTACKS
1. Excessive privileges
2. Privilege abuse
3. Unauthorized privilege elevation
4. Platform vulnerabilities
5. SQL injection
6. Weak audit
7. Denial of service
8. Database protocol vulnerabilities
9. Weak authentication
10.Exposure of backup data
PLATFORM VULNERABILITIES
Vulnerabilities in underlying operating
systems may lead to unauthorized data
access.
PLATFORM VULNERABILITIES
Vulnerabilities in underlying operating systems
(Windows 2000, UNIX, etc.) and additional services
installed on a database server may lead to
unauthorized access, data corruption, or denial of
service.
PLATFORM VULNERABILITIES
Slammer worm on Windows machines
running MS SQL Server
PLATFORM VULNERABILITIES
 Aliases: SQL Slammer,
W32.SQLExp.Worm
 Released: January 25, 2003, at
about 5:30 a.m. (GMT)
 Fastest worm in history
 Spread world-wide in under 10 minutes
 Doubled infections every 8.5 seconds
 376 bytes long
PLATFORM VULNERABILITIES
 Platform:Microsoft SQL Server 2000
 Vulnerability: Buffer overflow
 Patch available for 6 months
 Propagation: Single UDP packet
PLATFORM VULNERABILITIES
 Infected between 75,000 and 160,000
systems
 Disabled SQL Server databases on infected
machines
 Saturated world networks with traffic
 Disrupted Internet connectivity world-wide
PLATFORM VULNERABILITIES
 Disrupted financial institutions
 Airline delays and cancellations
 Affected many U.S. government and
commercial websites
PLATFORM VULNERABILITIES
 13,000 Bank of America ATMs stopped
working
 Continental Airlines flights were cancelled
and delayed; ticketing system was
inundated with traffic. Airport self-check-in
kiosks stopped working
 Activated Cisco router bugs at Internet
backbones
PLATFORM VULNERABILITIES
 Single UDP packet
 Targets port 1434 (Microsoft-SQL-Monitor)
 Causes buffer overflow
 Continuously sends itself via UDP packets to
pseudo-random IP addresses, including broadcast
and multicast addresses
 Does not check whether target machines exist
PLATFORM VULNERABILITIES
PLATFORM VULNERABILITIES
PLATFORM VULNERABILITIES
PLATFORM VULNERABILITIES
PLATFORM VULNERABILITIES
PLATFORM VULNERABILITIES
 Reconstructs session from buffer overflow
 Obtains (and verifies!) Windows API
function addresses
 Initializes pseudo-random number
generator and socket structures
 Continuously generates random IP
addresses and sends UDP data-grams of
itself
Reconstruct
session
Get
Windows
API
addresses
Initialize
PRNG and
socket
Send
Packets
Buffer
Overflow
PLATFORM VULNERABILITIES
The Blaster worm took advantage of a Windows
2000 vulnerability to take down target
servers.(create denial of service conditions)
PLATFORM VULNERABILITIES
 Also known as Lovsan, Poza, Blaster.
 First detected on August 11, 2003
 Exploits the most widespread Windows flaw ever
 A vulnerability in Distributed Component Object
Model (DCOM) that handles communication using
Remote Procedure Call (RPC) protocol
PLATFORM VULNERABILITIES
 Affects Windows 2000 and Windows XP
 Two messages in the code:
1. “I just want to say LOVE YOU SAN!””
2. “billy gates why do you make this possible? Stop
making money and fix your software!!”
 Infected more than 100,000 computers in 24 hours
PLATFORM VULNERABILITIES
 Detected in mid-July 2003
 RPC protocol allow a program to run code
on a remote machine
 Incorrectly handles malformed messages on
RPC port 135, 139, 445, 593
 Attackers send special message to remote
host
 Gain local privilege, run malicious code
PLATFORM VULNERABILITIES
Vulnerability Scorecard Report
Published: March 2011
This study leverages data from the National
Vulnerability Database (NVD), the industry
standard source of security vulnerability
data.
PLATFORM VULNERABILITIES
Consequence
 Server is compromised
 Direct access to database files
 Local access through admin roles
 Install backdoors
PLATFORM VULNERABILITIES
Mitigation
 Network ACLs: Simple FW to allow access only to
required services
 Network IPS: Traditional detection of known
vulnerabilities
IPS tools are a good way to identify and/or block attacks
designed to exploit known database platform vulnerabilities.
REFERENCE
 eEye Digital Security.
http://www.eeye.com/html/Research/Flash/sapphire.txt
 Cooperative Association for Internet Data Analysis
(CAIDA)
http://www.caida.org/outreach/papers/2003/sapphire/sapphi
re.html
 Internet Storm Center.
http://isc.incidents.org/analysis.html?id=180

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

098
098098
098
 
Spreading virus
Spreading virusSpreading virus
Spreading virus
 
Backdoor
BackdoorBackdoor
Backdoor
 
Owasp universal-http-do s
Owasp universal-http-do sOwasp universal-http-do s
Owasp universal-http-do s
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Web backdoors attacks, evasion, detection
Web backdoors   attacks, evasion, detectionWeb backdoors   attacks, evasion, detection
Web backdoors attacks, evasion, detection
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Cruda, mayday pp tx 2
 Cruda, mayday pp tx 2 Cruda, mayday pp tx 2
Cruda, mayday pp tx 2
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Top 10 Latest Viruses
Top 10 Latest VirusesTop 10 Latest Viruses
Top 10 Latest Viruses
 
Linux Virus
Linux VirusLinux Virus
Linux Virus
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
 
Trojan
TrojanTrojan
Trojan
 
Kali linux and hacking
Kali linux  and hackingKali linux  and hacking
Kali linux and hacking
 
Qualys Threads
Qualys ThreadsQualys Threads
Qualys Threads
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networks
 
EvilDuino
EvilDuinoEvilDuino
EvilDuino
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
 

Semelhante a Data Base Attack

5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
drewz lin
 
Rootkit&honeypot aalonso-dcu-dec09
Rootkit&honeypot aalonso-dcu-dec09Rootkit&honeypot aalonso-dcu-dec09
Rootkit&honeypot aalonso-dcu-dec09
Angelill0
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
 

Semelhante a Data Base Attack (20)

5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Hacking Exposed LIVE: Attacking in the Shadows
Hacking Exposed LIVE: Attacking in the ShadowsHacking Exposed LIVE: Attacking in the Shadows
Hacking Exposed LIVE: Attacking in the Shadows
 
Malware
MalwareMalware
Malware
 
IBPS SO
IBPS SOIBPS SO
IBPS SO
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Infosec
InfosecInfosec
Infosec
 
Rootkit&honeypot aalonso-dcu-dec09
Rootkit&honeypot aalonso-dcu-dec09Rootkit&honeypot aalonso-dcu-dec09
Rootkit&honeypot aalonso-dcu-dec09
 
Blast off!
Blast off!Blast off!
Blast off!
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytesnull Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
 هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme... هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
security.pdf
security.pdfsecurity.pdf
security.pdf
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Data Base Attack