210 likes | 273 Vues
Discover the latest hacking techniques and defense strategies for securing your SQL Server. Learn through user groups, conferences like GrrCON and SQL Saturday, and hands-on activities like Capture the Flag and forensics. Stay updated with Exploit-DB releases and security news via RSS feeds and Twitter. Explore attack vectors, tools like BackTrack and Metasploit, payload options, and social engineering tactics. Gain insights on patching vulnerabilities and common misconfigurations to enhance your server's security. Be proactive against potential threats with layers of defense, from firewalls to log monitoring, and stay ahead of emerging risks. Roadblock: Don't hinder your business by neglecting security measures. Join post-carnage analysis and stay vigilant against evolving hacks and attacks.
E N D
Learning • User groups • Cisco, SQL, Virtualization • Conferences • GrrCON, SQL Saturday • Hands-On • Capture the Flag • Forensics • RSS • Exploit-DB updates • SecurityFocusVuln.. • Content on Security Street • Twitter • @markrussinovich • @Wh1t3Rabbit • @EggDropX • @msftsecurity
Initial Attack Vectors • Network communication vital Proxies Corporate/Windows Firewalls
Authentication vs. Authorization Problem: Hackers don’t care about Authorization
Tools • BackTrack (bt) • Bootable, vm, phone • Zenmap • Metasploit framework • 927+ exploits • 251+ payloads • Meterpreter • Social Engineering Toolkit • Netdiscover • Fasttrack & autopwn
Tools (NEW HOTNESS) • Kali Linux • Bootable, vm, phone • Metasploit framework • 927+ exploits • 251+ payloads • Meterpreter • Social Engineering Toolkit • Netdiscover • BBQSQL (sql injection) • AND MORE!
Meterpreter Payload • Interesting Commands • Getuid • GetSystem • Ps • kill • Migrate • Shell • Hashdump • Webcam_snap • clearev
Patches and Misconfigurations • If you are not patching, no reason for pen testing • Don’t forget 3rd party utilities • Peer review servers • cleanup
Misconfigurations • Blank or weak ‘sa’ password • Default 3rd party passwords • Accidental administrators(Dev) • Over privileged services(System) • Extra un-used services(Writer) • Extra un-used protocols (SQL Auth)
Patches • Reversing patches is common practice • Midi file buffer overflow exploited in wild 16 days after the patch • Common msf exploits used MSYY- naming convention • CVE – common vulnerabilities and exposures • Know unsupported dates
Layers • Layers that still work • Firewalls • Strong Passwords • Antivirus • Patches • Group Policy • Log Monitoring • Least privilege • Audits and Testing • DR • Did someone say zombies?
Roadblock • Don’t be a disabler for business.
Q&A • Other hacks? • ‘ OR 1=1; -- Create table, insert web.config • Browser based attacks • The next MS08_067 • Review whiteboarding