930 likes | 1.24k Views
Welcome to Database Scanner 4.1. Course Objectives. Install and configure Database Scanner List Database Scanner components Determine database security vulnerabilities Correlate security vulnerabilities with representative checks Create a security policy Run a security scan
E N D
Welcome to Database Scanner 4.1 Database Scanner
Course Objectives • Install and configure Database Scanner • List Database Scanner components • Determine database security vulnerabilities • Correlate security vulnerabilities with representative checks • Create a security policy • Run a security scan • Run a penetration test • Assess password strength • Analyze security scan results Database Scanner
Course Outline • Module 1 - Understanding the Need for Database Security • Module 2 - Installing and Configuring Database Scanner • Module 3 - Navigating the Main Window • Module 4 - Understanding Vulnerabilities • Module 5 - Working with Security Policies • Module 6 - Scanning with Database Scanner • Module 7 - Assessing Password Strength • Module 8 - Analyzing Results Database Scanner
Module 1 Understanding the Need for Database Security Database Scanner
Module Objectives • Identify the causes of security violations • Identify the need for Database Scanner • List the tasks performed by Database Scanner • Identify the features of Database Scanner • List the advantages of using Database Scanner Database Scanner
Relational Database Customers Orders • Relational Database • A database system that contains tables that relate to each other by indexes • Separates physical data and logical data representation Database Scanner
How are Databases Used? Databases store vital company information, such as: • Financial records • Payroll records • Customer data • Account information • Medical information • Credit card information Database Database Scanner
DBA Permissions • Database Object Permissions • Database Scanner can grant or deny any of these explicit permissions per user or role/group, per object • Microsoft SQL Server/Sybase Select from table Select from view Update table Update view Delete from table Delete from view Insert to table Insert to view Declarative referential Execute stored procedure integrity Execute extended stored procedure Database Scanner
SQL – Structured Query Language • Standard language used by relational database systems • Developed by E. F. Codd – 1970s, IBM San Jose Research lab • Oracle ships first commercial SQL version in 1979, followed by IBM • SQL is an interactive query language for specific database queries • SQL is a database programming language Database Scanner
Why Database Security is Important • Protects critical information • Databases are the foundation of e-business • Databases not under the same scrutiny as other systems • Most security professionals do not understand databases • Databases are complex • Securing a database aloneis not sufficient Database Scanner
Complexity of Database Security Databases include their own: • Login accounts • Auditing language • Permissions language • Scripting language • Password control function Database Scanner
Information Passing Database Scanner
Types of Threats • Internal threats • External threats • Structured threats • Unstructured threats Database Scanner
Top Internet Threats • Denial of Service attacks • Firewall attacks • E-mail vulnerabilities • Windows NT vulnerabilities • Unix vulnerabilities • Internal threats and activity • Document interception • Virus infection Database Scanner
Default Ports Microsoft SQL Sybase Adaptive Oracle Server Server Current version 7 (SP1) 11.9.2 8i (8.1.5) Installed base 6.5 11.x 7.3, 8.0.x Lots of Unix, Lots of Unix, Operating systems Windows NT Windows NT, Windows NT mainframes, etc. Named Pipes,TCP/IP Networks sockets, IPX, TCP/IP sockets, TCP/IP sockets, supported Multiprotocol Named Pipes Named Pipes (RPC based), IPX, etc. Default IP port 5000 for NT, no 1521 - Oracle 7.0 1433 number default for Unix 1526 - Oracle 8.0 Database Scanner
Developing an ANS Process Database Scanner
Using Layers of Security Layer1 Corporate Regional Layer 2 Team Layer 3 Database Scanner
Addressing Administrators’ Security Needs Database Scanner allows administrators to: • Establish security policies. • Provide an assessment of security vulnerabilities. • Provide continuous security enhancements. • Close the gap between security policy and security practices. • Help the organization respond effectively to all aspects of database security. Database Scanner
Task Performed by Database Scanner • Set up security policies • Analyze configuration settings • Analyze password usage • Promote enforcement of security policies • Scan databases • Detect and report on vulnerabilities • Provide corrective actions Database Scanner
Security Features • Detect weak passwords • Check password aging (expiration) • Detect login attacks • Detect stale logins (old, unused accounts) • Track login hour restrictions Database Scanner
Advantages of Database Scanner • Automation and Speed • Comprehensive Vulnerability Checks • Quickly Managed Reporting System • Scalability Database Scanner
Exercises • Threats Associated with an Unsecured Web Site • Addressing Administrator Needs • Tasks Performed by Database Scanner • Database Scanner Security Features and Advantages Database Scanner
Module Review • Reviewing the causes of security violations • Establishing the need for Database Scanner • Identifying the tasks performed by Database Scanner • Reviewing the features of Database Scanner • Discussing the advantages of using Database Scanner Database Scanner
Module 2 Installing and Configuring Database Scanner Database Scanner
Module Objectives • Identifying the requirements for installing Database Scanner • Downloading Database Scanner • Installing Database Scanner • Installing a license key • Installing X-Press Updates Database Scanner
Prerequisites for Installation • Database Scanner CD-Rom or install file • License Key • Sybase ODBC Driver (Sybase) • Open Client Library (Sybase) • SQL * NET driver or NET8 driver (Oracle) • SQL * NET or NET8 Client Libraries Database Scanner
Server Requirements • Microsoft SQL Server greater than 6.x (Windows NT or Windows 2000 ) • Sybase Adaptive Server 11.x or greater (Unix or Windows NT or Windows 2000) • Oracle 7.3 or greater (Unix or Windows) Database Scanner
Windows 2000 Support • Run Database Scanner from a Windows 2000 client • Run a scan of Microsoft SQL, Sybase, and Oracle installed on a Windows 2000 server • Run Microsoft SQL Server Client Side Checks Database Scanner
Driver Requirements Database Scanner
Minimum Workstation Requirements Database Scanner
Types of License Keys • Demonstration • Evaluation • Permanent Database Scanner
X-Press Updates • What is it? • A mechanism to update Database Scanner automatically • Modified System Stored Procedures (Microsoft SQL Server) • Service Packs (Microsoft SQL Server and Windows NT) Database Scanner
Exercises • Installing Database Scanner • Installing a License Key Database Scanner
Module Review • Reviewing the system requirements for installing Database Scanner • Downloading Database Scanner • Installing Database Scanner • Installing a license key • Installing X-Press Updates Database Scanner
Module 3 Navigating the Main Window Database Scanner
Module Objective • Selecting menu items in the Database Scanner main window menu bar • Accessing secondary windows • Using the online help Database Scanner
Secondary Windows • Scan a database • Create a security policy • Analyze security scan results • Use the password strength utility Database Scanner
Scan Database Window Database Scanner
Exercises • Using Database Scanner Windows • Accessing Secondary Windows • Using Online Help Database Scanner
Module Review • Selecting menu items in the Database Scanner main window menu bar • Accessing secondary windows • Using the online help Database Scanner
Module 4 Understanding Vulnerabilities Database Scanner
Module Objectives • Identify types of vulnerabilities • Identify security setting categories • Identify categories of vulnerabilities Database Scanner
Describing Vulnerabilities • Human error and misconfigurations • Software bugs • Unsecured network services • Enabled and unused network services Database Scanner
Vulnerability Examples Oracle ELEMENT MS SQL Server Sybase AS Login / Account Management Stale Logins/Accts. Off Hours Usage Attacks Password Management Strength Aging Trojan Horses Rights / Permissions Database Scanner
Default Admin Login IDs/Accounts Microsoft Sybase Adaptive Oracle SQL Server Server Default sa sa sys, system Admin Default sys - Admin blank blank "change_on_install" passwords system - "manager" "Local "sybase" for Unix "oracle" for Unix Default OS System" for "Local System" "Local System" for accounts NT for NT NT Database Scanner
Stale Logins/Accounts ELEMENT MS SQL Server Sybase AS Oracle Login / Account Management Stale Logins/ Accts . No Control No Control No Control in 7 Stale Logins/ Accts . Off Hours Usage Attacks Password Management Strength Aging Trojan Horses Rights / Permissions • Logins/Accounts that haven’t been used for a period of time Database Scanner
Off Hour Usage ELEMENT MS SQL Server Sybase AS Oracle Login / Account Management Stale Logins/ Accts . Off Hours Usage Off Hours Usage No Control No Control No Control Attacks Password Management Strength Aging Trojan Horses Rights / Permissions • No controls restricting logging into the database during non-business hours Database Scanner
Login Attacks ELEMENT MS SQL Server Sybase AS Oracle Login / Account Management Stale Logins/ Accts . Off Hours Usage No Protection Attacks Attacks No Protection No Protection in 7 Password Management Strength Aging Trojan Horses Rights / Permissions • Series of failed logins within a short period of time • Microsoft SQL Server, Sybase, and Oracle 7 lack the ability to lock out accounts • Oracle 8 • FAILED_LOGIN_ATTEMPT parameter Database Scanner
Dictionary Attacks • Microsoft SQL Server isvulnerable to Brute Force attacks. • Absence of Lockout • Lack of password strength facility • No control over stale logins/passwords Database Scanner
SA Password Exposure ELEMENT MS SQL Server Sybase AS Oracle Login / Account Management Stale Logins/ Accts . Off Hours Usage Attacks Password Management Password Management Strength Aging Trojan Horses Rights / Permissions • Registering a server under Standard Security leaves the sa password in clear text within the registry • HKEY_CURRENT_USER\SOFTWARE\Microsoft\Microsoft SQL Server\SQLEW\Registered Server\SQL 6.5. • Only available to logged on user, but in practice, it is saved locally as the NTUSER.DAT (for NT) or the USER.DAT (for Windows 95/98) Database Scanner