Theodore Lawson CSCE548 Student Presentation, Topic #2

Slides:



Advertisements
Similar presentations
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
Advertisements

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Understand Database Security Concepts
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection Yuji Kosuga, Kenji Kono, Miyuki Hanaoka Keio University Miho Hishiyama,
By Brian Vees.  SQL Injection  Username Enumeration  Cross Site Scripting (XSS)  Remote Code Execution  String Formatting Vulnerabilities.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Database Connectivity Rose-Hulman Institute of Technology Curt Clifton.
1 RAKSHA: A FLEXIBLE ARCHITECTURE FOR SOFTWARE SECURITY Computer Systems Laboratory Stanford University Hari Kannan, Michael Dalton, Christos Kozyrakis.
SQL-Injection attacks Damir Lizdek & Dan Rundlöf Language-based security.
Injection Attacks by Example SQL Injection and XSS Adam Forsythe Thomas Hollingsworth.
{ Code Injection Cable Johnson.  Overview  Common Injection Types  Developer Prevention Code Injection.
Secure Software Development Mini Zeng University of Alabama in Huntsville 1.
SQL INJECTION COUNTERMEASURES &
Hamdi Yesilyurt, MA Student in MSDF & PhD-Public Affaris SQL Riji Jacob MS Student in Computer Science.
CSCI 6962: Server-side Design and Programming Secure Web Programming.
Approaches to Application Security – DSM
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 5 “Database and Cloud Security”.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
Attacking Applications: SQL Injection & Buffer Overflows.
Analysis of SQL injection prevention using a proxy server By: David Rowe Supervisor: Barry Irwin.
Project Overview Graduate Selection Process Project Goal Automate the Selection Process.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
Attacking Data Stores Brad Stancel CSCE 813 Presentation 11/12/2012.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Analysis of SQL injection prevention using a filtering proxy server By: David Rowe Supervisor: Barry Irwin.
Hands-On with RailsGoat WEB APPLICATION SECURITY TESTING.
SQL Injection Jason Dunn. SQL Overview Structured Query Language For use with Databases Purpose is to retrieve information Main Statements Select Insert.
Sumanth M Ganesh B CPSC 620.  SQL Injection attacks allow a malicious individual to execute arbitrary SQL code on your server  The attack could involve.
Aniket Joshi Justin Thomas. Agenda Introduction to SQL Injection SQL Injection Attack SQL Injection Prevention Summary.
Building Secure Web Applications With ASP.Net MVC.
CSCE 548 Building Secure Software. CSCE Farkas2 Reading This lecture: – McGraw: Chapter 1 – Recommended: CyberInsecurity: The Cost of Monopoly,
1 Vulnerability Assessment Elisa Heymann Computer Architecture and Operating Systems Department Universitat Autònoma de Barcelona
SQL – Injections Intro. Prajen Bhadel College of Information Technology & Engeneering Kathmandu tinkune Sixth semister.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
WEB SECURITY WEEK 2 Computer Security Group University of Texas at Dallas.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Chapter 1 The Software Security Problem. Goals of this course Become aware of common pitfalls. Static Analysis and tools.
1 Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks Ben Smith Laurie Williams Andrew Austin North Carolina.
SQL Injection Josh Mann. What is SQL Injection  SQL injection is a technique for exploiting web applications that use client-supplied data in SQL queries.
Overview of Database Security Introduction Security Problems Security Controls Designing Database Security.
Error-based SQL Injection
SQL Injection By: Ayman Mohamed Abdel Rahim Ali Ehab Mohamed Hassan Ibrahim Bahaa Eldin Mohamed Abdel Sabour Tamer Mohamed Kamal Eldin Jihad Ahmad Adel.
SQL Injection By Wenonah Abadilla. Topics What is SQL What is SQL Injection Damn Vulnerable Web App SQLI Demo Prepared Statements.
SQL Injection Attacks S Vinay Kumar, 07012D0506. Outline SQL Injection ? Classification of Attacks Attack Techniques Prevention Techniques Conclusion.
SQL INJECTION Diwakar Kumar Dinkar M.Tech, CS&E Roll Diwakar Kumar Dinkar M.Tech, CS&E Roll
Classic Buffer OVERFLOW ATTACKS CSCE 548 Student Presentation Mouiad Al Wahah.
Information Systems Security
SQL Injection By Wenonah Abadilla.
Database and Cloud Security
CS457 Introduction to Information Security Systems
SQL Injection.
Database System Implementation CSE 507
Web Application Security
Module: Software Engineering of Web Applications
SE-1021 Software Engineering II
Cloud computing issues
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Execution with Unnecessary Privileges
Security Issues Formalization
SQL Injection.
SE604: Software Testing and QA Secure SW Development for QA Lecture#3
SQL Injection Attacks Many web servers have backing databases
2. Access Control Matrix Introduction to Computer Security © 2004 Matt Bishop 9/21/2018.
Security Issues CS 560 Lecture 9.
Chapter 13 Security Methods Part 3.
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Lecture 2 - SQL Injection
Web Hacking: Beginners
SQL Injection Attacks John Sweetnam
Presentation transcript:

Theodore Lawson CSCE548 Student Presentation, Topic #2 CWE-89 SQL Injection Theodore Lawson CSCE548 Student Presentation, Topic #2

Technical Overview Software constructs part of SQL commands from user-controllable inputs Software does not clean up elements from user that could end up modifying components downstream User inputs may alter logic to bypass security checkpoints, or insert statements that modify the back end database

Technical Overview Weakness Prevalence High SQL makes no distinction between the control and data planes. Mitigation Cost Low proper architecture and design. Attack Frequency high flaw is very easy to detect and exploit.

Technical Overview Consequences Data Loss Security Bypass Ease of Detection Automated Static Analysis Manual Analysis Attacker Awareness High Common flaw in data-rich applications

Examples Code intends to execute: SELECT * FROM items WHERE owner = <userName> AND itemname = <itemName>; If the attacker with the username Ted enters the string: name' OR 'a'='a Query becomes SELECT * FROM items WHERE owner = ‘ted' AND itemname = 'name' OR 'a'='a'; Which always evaluates true, and essentially becomes SELECT * FROM items;

Examples Confidentiality Loss of sensitive data Authentication Access account of other users Authorization Improper changing of information Integrity Delete information

Detection Methods Automated Static Analysis Advantages False Positives False Negatives Manual Analysis Disadvantages

Avoidance of Error Using proper languages, libraries, and frameworks Hibernate Enterprise Java Beans Separation between data and code Principle of Least Privilege

Conclusion Importance Easily exploited Easily avoided Relevance Potential damage Attacker awareness What we can do Be aware Use tools to detect

References 2011 CWE/SANS Top 25 Most Dangerous Software Errors https://cwe.mitre.org/top25/index.html#CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection’) https://www.security-database.com/cwe.php?name=CWE-89 SQL Injection Examples http://www.w3schools.com/sql/sql_injection.asp