19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 15<br />

Databases and Storage Systems<br />

In This Chapter<br />

▶ Testing and exploiting database flaws<br />

▶ Finding storage weaknesses<br />

▶ Ferreting out sensitive information<br />

▶ Countering database and storage abuse<br />

A ttacks against databases and storage systems can be very serious<br />

because that’s where “the goods” are located, and the bad guys are<br />

well aware of that. These attacks can occur across the Internet or on the<br />

internal network when external attackers and malicious insiders exploit any<br />

number of vulnerabilities. These attacks can also occur via the web application<br />

through SQL injection.<br />

Diving into Databases<br />

Database systems, such as Microsoft SQL Server, MySQL, and Oracle, have<br />

lurked behind the scenes, but their value and their vulnerabilities have finally<br />

come to the forefront. Yes, even the mighty Oracle that was once claimed<br />

to be unhackable is susceptible to similar exploits as its competition. With<br />

the slew of regulatory requirements governing database security, hardly any<br />

business can hide from the risks that lie within because practically every<br />

business (large and small) uses some sort of database.<br />

Choosing tools<br />

As with wireless, operating systems, and so on, you need good tools if you’re<br />

going to find the database security issues that count. The following are my<br />

favorite tools for testing database security:<br />

✓ Advanced SQL Password Recovery (www.elcomsoft.com/asqlpr.<br />

html) for cracking Microsoft SQL Server passwords

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!