Top Tips To Exploit SQL Server Systems

24/06/2011 12:40

It 'a hand poking through and inciting or use of security testing tools, malicious attackers employ a variety of tricks to get into SQL Server systems, both inside and outside the firewall. And 'course, then, if the hackers do, you must bring the same attacks to test the strength of security systems. Here are 10 hacker tricks to reach and destroy the system of SQL Server.

First Direct connections via the Internet

These connections can be used to connect to SQL Servers sitting naked without firewall protection for everyone to see (and access). Puerto DShield report shows how the systems are sitting there, waiting to be attacked. I do not understand the logic behind making a critical server like this directly accessible from the Internet, but still find this error in my assessment, and we all remember the effect the SQL Slammer worm had so many vulnerable SQL Server systems. However, these direct attacks can lead to a denial of service buffer overflows, and more.
2. They are listed in the SQL Server Service Solution

Operates on UDP port 1434, this allows you to find cases database hidden and probe deeper into the system. Chip Andrews SQLPing V 2.5 is an excellent tool to use to find the SQL Server system (s) and determine version numbers (a little). This works even if your SQL Server instances are not listening on the default ports. In addition, a buffer overflow occurs when too long a request for SQL Servers is sent to the UDP broadcast address 1434th

3 Cracking passwords SA

Deciphering SA passwords is also used by hackers to enter the SQL Server databases. Unfortunately, in many cases there are no cracks needed because no password has been assigned (Oh, logic, where are you?). Yet another use of the tool handy-dandy SQLPing mentioned earlier. Commercial products from Application Security Inc. AppDetective NGSSQLCrack of NGS Software Ltd. also have this option.

4. Attacks exploit

Direct attacks using tools such as Metasploit, shown in Figure 2, and their commercial counterparts (canvas and CORE IMPACT) to exploit certain vulnerabilities found during normal vulnerability scanning. This is the typical silver bullet trick for attackers penetrating a system and execute code injection or gaining unauthorized command-line for access.
SNMP exploits can be discovered by attackers and lead to the compromise of the server database. The bad guys can use open source, home or commercial tools. Some are even smart enough to carry out their hacks manually from a command prompt. For reasons of time (and minimal wheel spinning), I recommend using commercial vulnerability assessment tools like QualysGuard from Qualys Inc. (for general scanning), WebInspect from SPI Dynamics (for scanning the Web application) and NGSSquirrel Next Generation Security Software Ltd. for SQL Server (for database-specific scanning). They are easy to use, offers the most comprehensive assessment, and in return the best results add.

5.Vulnerability analysis

Vulnerability scanning often reveals weaknesses in the underlying OS, the Web application or system database itself. Something missing SQL Server patches to Internet Information Services (IIS) configuration weaknesses to SNMP exploits can be discovered by attackers and lead to the compromise of the server database. The bad guys can use open source, home or commercial tools. Some are even smart enough to carry out their hacks manually from a command prompt. For reasons of time (and minimal wheel spinning), I recommend using commercial vulnerability assessment tools like QualysGuard from Qualys Inc. (for general scanning), WebInspect from SPI Dynamics (for scanning the Web application) and NGSSquirrel Next Generation Security Software Ltd. for SQL Server (for database-specific scanning). They are easy to use, offers the most comprehensive assessment, and in return the best results add.
6th SQL Injection

SQL injection attacks are executed via front-end web applications that do not properly validate user input. Malformed SQL queries, including SQL commands can be inserted directly into Web URLs and return error information, the commands being executed and more. These attacks can be carried out manually - if you have a lot of time. When I discovered that the server has a potential SQL injection vulnerability, I prefer to follow up by using an automated tool, such as SPI Dynamics' SQL Injector.
7th Blind SQL Injection

These attacks will exploit web applications and back-end SQL Servers in the same way that the basic standard of SQL injection. The big difference is that the attacker does not receive a response from Web server as error messages returned. This type of attack is even slower than standard SQL injection given the guesswork. You need a good tool for this, and that's where absinthe.
8. Reverse engineering system

The trick reverse engineering software research exploits the weaknesses of memory corruption and so on. In this chapter, shows the excellent book Exploiting Software: How to break the code of Greg Hoglund and Gary McGraw, you'll find a discussion about reverse engineering ploys.

9th Google Hacks

Google Hacks use the extraordinary power of Google search engine to find SQL Server errors - such as "Incorrect syntax near '-. Leakage of public access systems several Google queries are available in the database Johnny Long Google Hacking (Look in the file. Sections titled Error Messages and files containing passwords.) Hackers use Google to find passwords, vulnerabilities in web servers, operating systems underlying the procedures available to the public and that "they can use to further compromise a SQL Server system The combination of these consultations with the names of Web sites through Google" site: " . operator often becomes the juicy information you never thought you might discover.

10. Looking through the web site's source code

The source code can also convert the information that can lead to SQL Server break in. Specifically, developers can store authentication information in SQL Server in ASP scripts to simplify the authentication process. A manual assessment or Google could reveal this information in a split second.