Oracle数据库安全讲义-by Paul Wright

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

NGSConsultingNextGenerationSecuritySoftwareLtd.NextGenerationSecuritySoftwareLtd.SecuringOracleForensicallySecuringOracleForensicallyPaulWrightSecuritySoftwareDeveloperandConsultantypNGSConsultingNextGenerationSecuritySoftwareLtd.OracleForensicsatISACAOracleForensicsatISACAAboutmyself~PaulM.WrightAboutmyself~PaulM.Wright•UniversityofManchesterComputerScientistspecialisedinOracleandsecurity.•6yearsOracleexperienceand7yearssecurityexperience.•11SANSconferencesandmostGIACqualifiedpersonintheUK.•PentestLtd.PublishedthefirstpaperonOracleForensicsinJanuary20052005.•NGSSoftwareforthelastyearwritingsecuritychecksforOracleSftkiithDidLithfildSoftwareworkingwithDavidLitchfield.•FirstGSOCwiththehighestmarkssofar~PeterFinniganscourse.•ThislatestworkisanextensionoftheOracleForensicsPaperfortheGSOCqualificationandIthinkitmaybeofinteresttoISACA.Copyright©2006.NGSSoftwareLtd.NGSConsultingNextGenerationSecuritySoftwareLtd.OracleForensicsatISACAOracleForensicsatISACAPlanofpresentationPlanofpresentation•Generaldatabasesecurity•Oracledatabasesecurity•PLSQLpackagesandSQLInjection•Identifyingeasyvulnerabilities•Patchingproblems•TryingtoIdentifyvulnerableproceduresygyp•Identifyvulnerablepackagesforensically•Assessingrisktozerodaysretrospectivelygypy•QuestionsCopyright©2006.NGSSoftwareLtd.NGSConsultingNextGenerationSecuritySoftwareLtd.OracleForensicsatISACAOracleForensicsatISACASomepriorresearchSomepriorresearchaboutyourselvesaboutyourselvesFinancialsectorFinancialsectorauditingandauditingandggconsultancyconsultancyCopyright©2006.NGSSoftwareLtd.NGSConsultingNextGenerationSecuritySoftwareLtd.OracleForensicsatISACAOracleForensicsatISACAWhyDatabaseSecurity?•Databasesholdthemostsensitiveinformationinacompany.WhetherthisisFinancial,MedicalorHRinformation,thedatabaseistheultimatetargetofahacker.CrownJewels.Creditcardnumbersforinstance.•PrivilegemodelsinDatabasesarelessevolvedinDBssodifficulttomanagePrivilegemodelsinDatabasesarelessevolvedinDBssodifficulttomanagee.g.PrivilegeinheritancewithnestedrolesandNoexplicitdenyinOracleonlyrevoke.Dtbdfiilltkbili•Databasesareusedforincreasinglycomplextasks,asbusinesslogicmovesfromthemiddletiertothedatabase,andsupportforfullprogramminglanguagessuchasJavaandCisadded.Thereforemorevulnerabilities.•Thinclientdesktopmovestothedatabase.MoreaccesstoDB.Copyright©2006.NGSSoftwareLtd.NGSConsultingNextGenerationSecuritySoftwareLtd.OracleForensicsatISACAOracleForensicsatISACAIntroductionIntroduction--NGSNGSNGSandDatabaseSecurity•NGSstartedin2001andmuchoftheresearchwasfocusedondatabase•NGSstartedin2001,andmuchoftheresearchwasfocusedondatabasevulnerabilities,asthiswasexpectedtobetheagrowthareawithinITSecurity.•In2001,Oracle9iwasreleased,containingover400newfeaturesandthecampaignslogan“Unbreakable”IwasworkingasanOracledeveloperatLinnProductsatthesloganUnbreakable.IwasworkingasanOracledeveloperatLinnProductsatthetimeandhadthewordunbreakableontopofmymonitor.DavidLitchfieldbrokeitandnowIworkforhim.•In2002NGSdevelopedvulnerabilityscanningtoolsforOracleandMSSQLdatabases•In2002,NGSdevelopedvulnerabilityscanningtoolsforOracleandMSSQLdatabases.•Followingfurthersuccessesindatabaseresearchandadvisoriesreleased,NGSnowhascomprehensivescanningtoolsforDB2,InformixandSybaseCopyright©2006.NGSSoftwareLtd.NGSConsultingNextGenerationSecuritySoftwareLtd.OracleForensicsatISACAOracleForensicsatISACAWhyOracleSecuritynow?WhyOracleSecuritynow?•Coredatabasehasbeensecure~Oracle’spride•TheAltersessionvariablebugaffectedthewholeDBandsodentedthispride.•AlsoOraclecriticisedDavidLitchfieldforpresentingafixintheabsenceofanyotherfix(mod_plsqlgateway).Difficulttojustify?GtOlilthbtifit•Gartner.Oracleisnolongerthebastionofsecurity.•Iaminterestedinthetechnicalratherthanpoliticalmediasidemediaside.Copyright©2006.NGSSoftwareLtd.NGSConsultingNextGenerationSecuritySoftwareLtd.OracleForensicsatISACAOracleForensicsatISACALocating,AnalysingandmitigatingThreats~Locating,AnalysingandmitigatingThreats~AgenericprocessAgenericprocess•Locatethedatabaseinstancesonanetwork~PortscanningnmapAgenericprocessAgenericprocessLocatethedatabaseinstancesonanetworkPortscanningnmap•Runvulnerabilityauditssimilartostandardvulnerabilityassessmenttools~VulnerabilityscannerlikeNessusRnSQLscriptsonthedatabasetodetermineinternalthreats•RunSQLscriptsonthedatabasetodetermineinternalthreats•Placevulnerabilitiesinabusinesscontextduringreportandanalysis•Securevulnerabilitiesthroughpatching,revokingaccess,orremovingtheaffectedresourceCopyright©2006.NGSSoftwareLtd.NGSConsultingNextGenerationSecuritySoftwareLtd.OracleForensicsatISACAOracleForensicsatISACATop8threatsthatoccurinadatabase?Top8threatsthatoccurinadatabase?1.DefaultorWeakPasswords2PrivilegeAbuse–noexplicitdenyprivonlyrevokea2.PrivilegeAbusenoexplicitdenyprivonlyrevokeagrant.3.BufferOverflowandFormatString3ueOeoadoaSg4.NetworkCommunicationvulns5.Reading&WritingArbitrarySystemFiles5.Reading&WritingArbitrarySystemFiles6.SQLInjection7BreakingoutoftheDatabase7.BreakingoutoftheDatabaseCopyright©2006.NGSSoftwareLtd.NGSConsultingNextGenerati

1 / 29
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功