210 likes | 320 Vues
In today's cyber landscape, understanding SQL Server security is critical for safeguarding sensitive data. This comprehensive guide dives into the best defense strategies against hacking threats, focusing on proactive measures and essential tools. Gain insights from user groups, conferences like GrrCON and SQL Saturday, and hands-on Capture the Flag experiences. Learn about attack vectors, essential hacking tools such as Metasploit and Kali Linux, and the importance of patching and misconfiguration cleanup to thwart unauthorized access. Elevate your security game today!
E N D
Learning • User groups • Cisco, SQL, Virtualization • Conferences • GrrCON, SQL Saturday • Hands-On • Capture the Flag • Forensics • RSS • Exploit-DB updates • SecurityFocusVuln.. • Content on Security Street • Twitter • @markrussinovich • @Wh1t3Rabbit • @EggDropX • @msftsecurity
Initial Attack Vectors • Network communication vital Proxies Corporate/Windows Firewalls
Authentication vs. Authorization Problem: Hackers don’t care about Authorization
Tools • BackTrack (bt) • Bootable, vm, phone • Zenmap • Metasploit framework • 927+ exploits • 251+ payloads • Meterpreter • Social Engineering Toolkit • Netdiscover • Fasttrack & autopwn
Tools (NEW HOTNESS) • Kali Linux • Bootable, vm, phone • Metasploit framework • 927+ exploits • 251+ payloads • Meterpreter • Social Engineering Toolkit • Netdiscover • BBQSQL (sql injection) • AND MORE!
Meterpreter Payload • Interesting Commands • Getuid • GetSystem • Ps • kill • Migrate • Shell • Hashdump • Webcam_snap • clearev
Patches and Misconfigurations • If you are not patching, no reason for pen testing • Don’t forget 3rd party utilities • Peer review servers • cleanup
Misconfigurations • Blank or weak ‘sa’ password • Default 3rd party passwords • Accidental administrators(Dev) • Over privileged services(System) • Extra un-used services(Writer) • Extra un-used protocols (SQL Auth)
Patches • Reversing patches is common practice • Midi file buffer overflow exploited in wild 16 days after the patch • Common msf exploits used MSYY- naming convention • CVE – common vulnerabilities and exposures • Know unsupported dates
Layers • Layers that still work • Firewalls • Strong Passwords • Antivirus • Patches • Group Policy • Log Monitoring • Least privilege • Audits and Testing • DR • Did someone say zombies?
Roadblock • Don’t be a disabler for business.
Q&A • Other hacks? • ‘ OR 1=1; -- Create table, insert web.config • Browser based attacks • The next MS08_067 • Review whiteboarding