11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 18: Securing Your Database Server 505AttacksDirect connection attacks exist for both authenticated users <strong>and</strong> those without a username <strong>and</strong> password; for example:● Tools such as Query Analyzer (Isqlw.exe) or the comm<strong>and</strong> line equivalent(Osql.exe) are used to establish a direct connection to SQL Server <strong>and</strong> issuecomm<strong>and</strong>s.● Server information, such as software version, is revealed to an attacker who sendscarefully constructed packets to listening ports.CountermeasuresTo counter these attacks:● Make sure that SQL Server ports are not visible from outside of the perimeternetwork.● Within the perimeter, restrict direct access by unauthorized hosts, for example, byusing IPSec or TCP/IP filters.Password CrackingA common first line of attack is to try to crack the passwords of well known accountnames, such as sa (the SQL Server administrator account).VulnerabilitiesCommon vulnerabilities that lead to password cracking are:●●Weak or blank passwordsPasswords that contain everyday wordsAttacksCommon password cracking attacks include:●●Dictionary attacksManual password guessingCountermeasuresTo counter these attacks:●●Create passwords for SQL Server login accounts that meet complexityrequirements.Avoid passwords that contain common words found in the dictionary.Note If you use Windows authentication, password complexity can be enforced by Windowssecurity policy.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!