GreenSQL Yuli Stremovsky /MSN/Gtalk:

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
How Did I Steal Your Database Mostafa
Information Networking Security and Assurance Lab National Chung Cheng University Analysis Console for Intrusion Databases.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
E-Commerce The technical side. LAMP Linux Linux Apache Apache MySQL MySQL PHP PHP All Open Source and free packages. Can be installed and run on most.
PaperCut NG Chris Dance. Copyright © PaperCut Software Pty. Ltd. 2 Overview Overview of PaperCut NG Why we offer a Mac Version The story of our.
DR. MOHAMMAD IQBAL THANKS TO ADITYA SENGUPTA Comparing Web Frameworks.
Project Implementation for COSC 5050 Distributed Database Applications Lab1.
By Jeerarat Boonyanit. As you can see I have chosen Cpanel for my server management tool. cPanel is a Linux based web hosting control panel that provides.
John Hartley Mark Bransby Utilizing Adobe's Publishing Solutions for Distributed Web Publishing.
Database Security Yuli Stremovsky. Agenda Database Security What is GreenSQL ? Management Console Demo GreenSQL Roadmap.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
SJSU CS157B Dr. Lee1  2004 Jenny Mitchell Two Useful Tools You Can’t Live Without by Jenny Mitchell SJSU CS157B Section PHP and MySQL.
Best Practices in Moodle Administration Best Practices in Moodle Administration A variety of topics from technical to practical Jonathan Moore Vice President.
Linux Operations and Administration
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
GOOGLE HACKING FOR PENETRATION TESTERS Chris Chromiak SentryMetrics March 27 th, 2007.
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
SQL Power Injector Avadanei AlinBalan Robert. What is SQL Power Injector ?  A graphical application created in C#.Net 1.1 that helps the penetration.
Analysis of SQL injection prevention using a proxy server By: David Rowe Supervisor: Barry Irwin.
Hamdi Yesilyurt, MA Student in MSDF & PhD-Public Affaris SQL Riji Jacob MS Student in Computer Science.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
ProCol~ A jEdit Plugin for Remote Project Collaboration Justin Dieters Spring 2004 CS470 Final Presentation.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
Web Application Firewall (WAF) RSA ® Conference 2013.
Attacking Applications: SQL Injection & Buffer Overflows.
Online Translation Service Capstone Design Eunyoung Ku Jason Roberts Jennifer Pitts Gregory Woodburn Kim Tran.
Analysis of SQL injection prevention using a proxy server By: David Rowe Supervisor: Barry Irwin.
SQL Server User Group Meeting Reporting Services Tips & Tricks Presented by Jason Buck of Custom Business Solutions.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
ArcGIS Server for Administrators
Accessing Your MySQL Database from the Web with PHP (Ch 11) 1.
AppSec USA 2014 Denver, Colorado CMS Hacking 101 Hacking and Securing Popular Open Source Content Management Systems.
SQL INJECTIONS Presented By: Eloy Viteri. What is SQL Injection An SQL injection attack is executed when a web page allows users to enter text into a.
Introduction to InfoSec – SQLI and jQuery (R9)
Securing Sensitive Information Data Security Dashboards often contain the most important data in the company Securing that information makes business.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Linux Services Configuration
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
PhpMyAdmin Matthew Walsh April 28, 2003 CMSC Shawn Sivy.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
8 th Semester, Batch 2009 Department Of Computer Science SSUET.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
XAMPP.
Introduction to MySQL  Working with MySQL and MySQL Workbench.
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Expertsfromindia for Joomla Development. Introduction Joomla is an open source and free content management system (CMS) for publishing content on the.
Final Project: Advanced Security Blade IPS and DLP blades.
PHP is a server scripting language, and a powerful tool for making dynamic and interactive Web pages. PHP is a widely-used, free, and efficient alternative.
Introduction SQL Injection is a very old security attack. It first came into existence in the early 1990's ex: ”Hackers” movie hero does SQL Injection.
Linux Kernel Security (SELinux vs AppArmor vs Grsecurity)
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Defense In Depth: Minimizing the Risk of SQL Injection
ArcGIS for Server Security: Advanced
Fundamental of Databases
Top 5 Open Source Firewall Software for Linux User
WEB APPLICATION TESTING
Introduction to SQL Server 2000 Security
PHP / MySQL Introduction
A Web-based Integrated Console for Controlling a Set of Networks
Chapter 13 Security Methods Part 3.
Lecture 2 - SQL Injection
Protecting Against Common Web Application Vulnerabilities
Presentation transcript:

GreenSQL Yuli Stremovsky /MSN/Gtalk:

Agenda What is SQL Injection? DEMO: Backdoor web server GreenSQL: Detailed Description DEMO: GreenSQL Other solutions Future plans

What is SQL Injection ? Legitimate Query: SELECT * from users where username = ‘Alice’ and password = ‘123456’ Injected SQL code: SELECT * from users where username = ‘Alice’ and password = ‘123456’ or ‘1’=‘1’

SQL Attacks Hazards Bypass Login page Read files Write Files Dump sensitive information Execute system commands Create database back door New Attack: Distribution of Trojans

Demo: Attack MySQL commands –select “text” into outfile “file.txt” Find directory with write permissions –templates_c / templates / temp –images / files / cache

C99 Web shell

Simple Web Shells Execute system commands Simple Web shell: –system() function –$_GET['cmd'] –$_POST['cmd'] –$_REQUEST['cmd']

MySQL Attack DEMO More info here: oor-webserver-using-mysql-sql-injection Demo

What is GreenSQL? GreenSQL is a database firewall solution Protects against SQL injection attacks Management console MySQL built in support

GreenSQL Diagram

GreenSQL Architecture Reverse Proxy Number of databases Number of backend DB servers Deployment options: –Can be installed together with the DB server –Can be installed on specialized server

How Query is Blocked Empty result is sent back to application Application can continue gracefully No TCP reset is send No errors is generated

GreenSQL Advantages Multiple modes –simulation / learning / active protection Easy Management Pattern Recognition (signatures) Heuristics (risk calculation) Open Source

GreenSQL Advantages 2 Cross Platform Rapid Deployment Well established Web application independent The only free security solution for MySQL User Friendly WEB GUI/Management tool

Supported modes Simulation mode Block suspicious commands –Based on overall query risk Learning mode –Whilelist patterns of used SQL command patterns Block new commands –Missing queries in Whitelist will be blocked.

Easy Management Management GUI IT Orientation Automatic Configuration –Learning Mode –Blocking mode

Pattern Recognition Detects administrative commands like: –create table/database –drop table/database –alter table structure Detects information disclosure commands –version() / current_user() / show tables Detects privileged commands –kill() / create_user() / load_file()

Example

Heuristic Analysis Access to sensitive tables increases risk query (users, accounts, credit information) SQL Comments Empty password string OR token UNION token SQL tautology (true statement) –or 1=1

Examples - Blocked

Whitelist

Positive & Negative Security Positive Security –Learning mode –Whitelist Negative security –Pattern recognition –Heuristic Analyses

Multiplatform support Linux based: –CentOS / OpenSUSE / Fedora / Mandrake –Debian / Ubuntu BSD based –FreeBSD Windows (beta)

Rapid Deployment Pre-build packages for popular Linux distributions and for FreeBSD Simple installation and configuration scripts Two configuration files –General configuration / DB settings –MySQL patterns

Not only for Web Apps Defense in depth methodology IT oriented Support legacy applications Does not require application configuration change Can be configured to listen on the original DB socket which database uses a different one.

Open Source Free Open Source GPL License MySQL support

Well established Hundreds of newsletter subscribers A bunch of the security reviews and hundreds bug fixes Active support forum Production version A bunch of blog reviews Sourceforge version for more that a year. Featured by popular resources: – – –

Console - DEMO Demo version is available here:

Related OS Solutions Snort IDS/Prelude ModSecurity PHPIDS MySQL built in security Kernel IDS solutions

Snort Network Level inspection TCP/ICPM reset Evasion of signatures SSL support ???

ModSecurity HTTP Traffic Apache Module Signature based Positive security

PHPIDS Signature bases Requires code change

Kernel IDS SE Linux Korset Control API functions

MySQL built in security Database / table user access rights Admin permission (FILE) GTANT Permission to –Max queries/connections/updates per hour SSL Additional Commands: –skip-show-databases

Future Version DB User permissions Support for PostgreSQL Higher heuristic detection More reports

Thank You Yuli Stremovsky /MSN/Gtalk: More info:

Google Database Firewall