Call: +44 (0)1904 557620 Call
Forum

Welcome, Guest. Please Login.
Apr 19th, 2024, 8:39pm
News: If you would like to register contact the forum admin
Home | Help | Search | Members | Login
   Pete Finnigan's Oracle Security Forum
   Oracle Security
   Oracle Security
(Moderator: Pete Finnigan)
   DB Hackers Handbook
« Previous topic | Next topic »
Pages: 1  Reply | Notify of replies | Send Topic | Print
   Author  Topic: DB Hackers Handbook  (Read 3152 times)
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
DB Hackers Handbook
« on: Jul 26th, 2005, 9:32am »
Quote | Modify

Hello Pete and Oracle Security folks,
Just been reading Oracle section in DB Hackers Handbook and thought I would recommend it as there are some interesting new issues explained very clearly.
Goodluck with the Forum Smiley
Cheers,
Paul
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
Re: DB Hackers Handbook
« Reply #1 on: Jul 26th, 2005, 11:02am »
Quote | Modify

Hi Paul,  
 
Thanks for the recomendation, I was aware of David's new book quite a long time ago when it wasn't available. I have just ordered it now from Amazon. You didn't give out the details of the book so I will do it now. The book is called "The Database hackers handbook" and it is written by David Litchfield, Chris Anley, John Heasman and Bill Grindlay (ISBN 0764578014) and covers hacking various database servers including Oracle, Microsoft SQL Server, DB2, PostGres, Sybase and MySQL.  
 
For UK readers the book is available at  - [url]<a href="http://www.amazon.co.uk/exec/obidos/redirect?path=ASIN/0764578014&li nk_code=as2&camp=1634&tag=petefinnigora-21&creative=6738">The Database Hacker's Handbook</a><img src="http://www.assoc-amazon.co.uk/e/ir?t=petefinnigora-21&l=as2&o=2& amp;a=0764578014" width="1" height="1" border="0" alt="" style="border:none !important; margin:0px !important;" />[/url] and for US readers on - [url]<a href="http://www.amazon.com/exec/obidos/redirect?path=ASIN/0764578014&link _code=as2&camp=1789&tag=petefinnigora-20&creative=9325">The Database Hacker's Handbook : Defending Database Servers</a><img src="http://www.assoc-amazon.com/e/ir?t=petefinnigora-20&l=as2&o=1&am p;a=0764578014" width="1" height="1" border="0" alt="" style="border:none !important; margin:0px !important;" />[/url]
 
As I said I have not seen it yet but I am sure David has included some previously un-published Oracle vulnerabilities and exploits. One reviewer on Amazon said the Oracle section is weak on how to secure the database but I don't think that this is what the book is aimed at. The book is aimed at showing how a hacker can gain access to your data and the underlying server by attacking database software.
 
cheers Paul,
 
Pete
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
Re: DB Hackers Handbook
« Reply #2 on: Jul 27th, 2005, 2:08pm »
Quote | Modify

I was a little disappointed in the Oracle material for the Database Hackers Handbook.  David does provide some interesting information (detailed below), but the areas I was specifically interested in (unwrapping wrapped code, using debuggers effectively with the DB), are not covered.
 
David does provide some interesting tools (source to a tool to enumerate the Oracle DB version, source to a tool to dump information from the intelligent agent).  He also includes a C tool similar to tnscmd.pl raw mode.
 
Some other interesting tidbits:
 
+ Flaw in the server wrapping process where an overly long constant causes a buffer overflow (no exploit code or additional details provided)
+ Some previously unreleased details about flaws in WKSYS.WK_ADM and WKSYS.WK_ACL (SQL Injection bugs, examples provided).
+ Flaw in 10g's DBMS_EXPORT_EXTENSION.GET_DOMAIN_INDEX_METADATA package (SQL Injection)
+ CTXSYS.DRILOAD.VALIDATE_STMT details
+ Exploits for triggers where PUBLIC is granted privileges for the action that causes the trigger to fire
 
There was also a brief section on iAS attacks, and then additional detail on exploiting the OS once access to the DB has been obtained.  The Securing Oracle section was very weak, but as Pete points out, that's not why you buy this book.  Perhaps the publishers insisted that they include some securing information to make the book attractive to a wider audience?
 
In all, I recommend purchasing this book.  I especially liked the amount of detail David uses to describe how WKSYS works, including the ability to exploit triggers based on other granted privileges.  It clearly illustrates that even Oracle doesn't think out security for these complex packages before granting access to PUBLIC.
 
-Josh
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
Re: DB Hackers Handbook
« Reply #3 on: Jul 27th, 2005, 2:27pm »
Quote | Modify

Hi Josh,
 
I just want to add to your excellent post about David's book that the CTXSYS.DRILOAD.VALIDATE_STMT vulnerability has become relevant again as this is one of the bugs that was not fixed properly in the April CPU even though this CPU said it was fixed. I have just posted an entry in my blog titled Oracle Patches Its Security Patches - Database patches fix flaws found in previous fixes that talks about Oracle's current woes with patches to fix patches to fix patches. This article doesn;t mention th DRILOAD issue directly but it was talked about in some of my posts around July 7 about the emails from Oracle on the April CPU issues.
 
cheers
 
Pete
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
Re: DB Hackers Handbook
« Reply #4 on: Jul 27th, 2005, 8:50pm »
Quote | Modify

Just wanted to point out that the code for the book is available at http://www.wiley.com/WileyCDA/WileyAncillary/productCd-0764578014.html.
 
-Josh
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
Re: DB Hackers Handbook
« Reply #5 on: Jul 29th, 2005, 3:29pm »
Quote | Modify

Just thought I would report that I got my copy today from Amazon. I will let you know what I think whn  i have read the Oracle chapters./
 
cheers
 
Pete
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pages: 1  Reply | Notify of replies | Send Topic | Print

« Previous topic | Next topic »

Powered by YaBB 1 Gold - SP 1.4!
Forum software copyright © 2000-2004 Yet another Bulletin Board
  • PFCLScan PFCLScan

    Simply connect PFCLScan to your Oracle database and it will automatically discover the security issues that could make your Oracle database vulnerable to attack and to the potential loss of your data.

  • PFCL Obfuscate PFCLObfuscate

    PFCLObfuscate is the only tool available that can automatically add license controls to your PL/SQL code. PFCLObfuscate protects your Intellectual Property invested in your PL/SQL database code.

  • PFCLCode PFCLCode

    PFCLCode is a tool to allow you to analyse your PL/SQL code for many different types of security issues. PFCLCode gives you a detailed review and reports and includes a powerful colour syntax highlighting code editor

  • PFCLForensics PFCLForensics

    PFCLForensics is the only tool available to allow you to do a detailed live response of a breached Oracle database and to then go on and do a detailed forensic analysis of the data gathered.

  • Products We resell PFCLReselling

    PeteFinnigan.com Limited has partnered with a small number of relevant companies to resell their products where they enhance or compliment what we do

  • PFCLATK PFCLATK

    PFCLATK is a toolkit that allows detailed pre-defined policy driven audit trails for your Oracle database. The toolkit also provides for a centralised audit trail and centralised activity reporting

  • PFCLCookie PFCLCookie

    PFCLCookie is a useful tool to use to audit your websites for tracking cookies. Scan websites in a natural way using powerful browser driven scanner

  • PFCL Training PFCLTraining

    PFCLTraining is a set of expert training classes for you, aimed at teaching how to audit your own Oracle database, design audit trails, secure code in PL/SQL and secure and lock down your Oracle database.

  • PFCL Services PFCLServices

    Choose PFCLServices to add PeteFinnigan.com Ltd to your team for your Oracle Security needs. We are experts in performing detailed security audits, data security design work and policy creation

  • PFCLConsulting PFCLConsulting

    Choose PFCLConsulting to ask PeteFinnigan.com Limited to set up and use our products on your behalf

  • PFCLCustom PFCLCustom

    All of our software products can be customised at a number of levels. Choose this to see how our products can be part of your products and services

  • PFCLCloud PFCLCloud

    Private cloud, public cloud, hybrid cloud or no cloud. Learn how all of our services, trainings and products will work in the cloud

  • PFCLUserRights PFCLUserRights

    PFCLUserRights allows you to create a very detailed view of database users rights. The focus of the reports is to allow you to decide what privileges and accounts to keep and which to remove.

  • PFCLSTK PFCLSTK

    PFCLSTK is a toolkit application that allows you to provide database security easily to an existing database. PFCLSTK is a policy driven toolkit of PL/SQL that creates your security

  • PFCLSFTK PFCLSFTK

    PFCLSFTK is a toolkit that solves the problem of securing third party applications written in PL/SQL. It does this by creating a thin layer between the application and database and this traps SQL Injection attempts. This is a static firewall.

  • PFCLSEO PFCLSEO

    PFCLSEO is a web scanner based on the PFCLScan technology so that a user can easily scan a website for technical SEO issues