19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

310<br />

Part V: Hacking Applications<br />

✓ Password hashes accessible through default/unprotected accounts<br />

✓ Weak authentication methods enabled<br />

✓ Database listener log files that can be renamed without authentication<br />

A great all-in-one commercial database vulnerability scanner for performing<br />

in-depth database checks — including user rights audits on SQL Server,<br />

Oracle, and so on — is AppDetectivePro (www.appsecinc.com/products/<br />

appdetective/). AppDetectivePro can be a good addition to your security<br />

testing tool arsenal if you can justify the investment.<br />

Many vulnerabilities can be tested from both an unauthenticated outsider’s<br />

perspective as well as a trusted insider’s perspective. For example, you can<br />

use the SYSTEM account for Oracle to log in, enumerate, and scan the system<br />

(something that QualysGuard supports). My fingers are crossed that Qualys<br />

will eventually support authenticated scans for SQL Server.<br />

Following Best Practices for Minimizing<br />

Database Security Risks<br />

Keeping your databases secure is actually pretty simple if you do the<br />

following:<br />

✓ Run your databases on different machines.<br />

✓ Check the underlying operating systems for security vulnerabilities. I<br />

cover operating system exploits for Windows and Linux in Chapters 11<br />

and 12, respectively.<br />

✓ Ensure that your databases fall within the scope of patching and system<br />

hardening.<br />

✓ Require strong passwords on every database system.<br />

✓ Use appropriate file and share permissions to keep prying eyes away.<br />

✓ De-indentify any sensitive production data before it’s used in development<br />

or QA.<br />

✓ Check your web applications for SQL injection and related input validation<br />

vulnerabilities.<br />

✓ Use a network firewall, such as those available from Fortinet (www.<br />

fortinet.com) or SonicWALL (www.sonicwall.com), and databasespecific<br />

controls, such as those available from Pyn Logic (www.pynlogic.<br />

com) and Idera (www.idera.com).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!