19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

306<br />

Part V: Hacking Applications<br />

Figure 15-1:<br />

SQLPing3<br />

can find<br />

SQL Server<br />

systems<br />

and check<br />

for missing<br />

sa account<br />

passwords.<br />

✓ Cain & Abel (www.oxid.it/cain.html) for cracking database password<br />

hashes<br />

✓ QualysGuard (www.qualys.com) for performing in-depth vulnerability<br />

scans<br />

✓ SQLPing3 (www.sqlsecurity.com/downloads) for locating Microsoft<br />

SQL Servers on the network, checking for blank sa (the default SQL Server<br />

system administrator account) passwords, and performing dictionary<br />

password-cracking attacks<br />

You can also use exploit tools, such as Metasploit, for your database testing.<br />

Finding databases on the network<br />

The first step in discovering database vulnerabilities is to figure out where<br />

they’re located on your network. It sounds funny, but many network admins<br />

I’ve met aren’t even aware of various databases running in their environments.<br />

This is especially true for the free SQL Server Express database software<br />

that anyone can download and run on a workstation or test system.<br />

I can’t tell you how often I find sensitive production data, such as credit card<br />

and Social Security numbers, being used in test databases that are completely<br />

wide open to abuse by curious insiders. Using sensitive data in the uncontrolled<br />

areas of development and quality assurance (QA) is a data breach waiting<br />

to happen.<br />

The best tool I’ve found to discover Microsoft SQL Server systems is<br />

SQLPing3, shown in Figure 15-1.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!