SlideShare a Scribd company logo
People                 Technology




Processes                  Standards




   SQL Injection To Enterprise 0wned




            K. K. Mookhey, CISA, CISSP,
                   CISM, CRISC
Introduction

    • Founder, Principal Consultant
          – Network Intelligence India Pvt. Ltd.
          – Institute of Information Security
    • CISA, CISSP, CISM, CRISC
    • Penetration testing, Security Auditing, Forensics,
      Compliance, Problem-solving
    • ICICI Bank, BNP Paribas, Morgan Stanley, United
      Nations, Indian Navy, DRDO, and hundreds of
      other clients over a decade of experience
    • Speaker at Blackhat, Interop, IT Underground,
      OWASP Asia, SecurityByte, Clubhack, Nullcon,
      ISACA, and numerous others

© Network Intelligence India Pvt. Ltd.
Agenda
       •    Introduction & Case Studies
       •    Risk-based Penetration Testing
       •    Solutions
       •    Strategies
       •    Take-Aways




© Network Intelligence India Pvt. Ltd.
THE BIGGEST HACK IN HISTORY


© Network Intelligence India Pvt. Ltd.
Gonzalez, TJX and Heart-break-land
    • >200 million credit card number stolen
    • Heartland Payment Systems, TJX, and 2
      US national retailers hacked
    • Modus operandi
          – Visit retail stores to understand workings
          – Analyze websites for vulnerabilities
          – Hack in using SQL injection
          – Inject malware
          – Sniff for card numbers and details
          – Hide tracks
© Network Intelligence India Pvt. Ltd.
The hacker underground
       • Albert Gonzalez
             – a/k/a “segvec,”
             – a/k/a “soupnazi,”
             – a/k/a “j4guar17”


       • Malware, scripts and hacked data hosted on servers in:
             – Latvia
             – Netherlands
                                    Ukraine
                                    New Jersey
       • IRC chats                  California
          – March 2007: Gonzalez “planning my second phase against
            Hannaford”
          – December 2007: Hacker P.T. “that’s how [HACKER 2] hacked
            Hannaford.”




© Network Intelligence India Pvt. Ltd.
Where does all this end up?

                                                         IRC Channels
                                                         #cc
                                                         #ccards
                                                         #ccinfo
                                                         #ccpower
                                                         #ccs
                                                         #masterccs
                                                         #thacc
                                                         #thecc
                                                         #virgincc

• Commands used on IRC
   – !cardable
   – !cc, !cclimit, !chk, !cvv2, !exploit, !order.log,
     !proxychk

   © Network Intelligence India Pvt. Ltd.
TJX direct costs      $200 million in
                                                      fines/penalties




                                $41 million to Visa

$24 million to
 Mastercard




  © Network Intelligence India Pvt. Ltd.
Cost of an incident
       • $6.6 million average cost of a data breach
       • From this, cost of lost business is $4.6
         million
       • More than $200 per compromised record

       On the other hand:
       • Fixing a bug costs $400 to $4000
       • Cost increases exponentially as time lapses




© Network Intelligence India Pvt. Ltd.
HOW THE COOKIE CRUMBLES


© Network Intelligence India Pvt. Ltd.
© Network Intelligence India Pvt. Ltd.
© Network Intelligence India Pvt. Ltd.
© Network Intelligence India Pvt. Ltd.
© Network Intelligence India Pvt. Ltd.
© Network Intelligence India Pvt. Ltd.
© Network Intelligence India Pvt. Ltd.
© Network Intelligence India Pvt. Ltd.
© Network Intelligence India Pvt. Ltd.
Betting blind!

   DB Name
   Table Names
   User IDs
   Table Structure
   Data




© Network Intelligence India Pvt. Ltd.
Net Result



Enterprise Owned!
SOLUTIONS!


© Network Intelligence India Pvt. Ltd.
Technology Solutions
       •    Encryption
       •    Web Application Firewalls
       •    Source Code Review Solutions
       •    Security Testing Suites
       •    Data Leakage Prevention
       •    Privileged Identity Management
       •    Web Access Management
       •    Information Rights Management
       •    Database Security Solutions


© Network Intelligence India Pvt. Ltd.
Before we get to the technology…




© Network Intelligence India Pvt. Ltd.
Application Security – Holistic Solution

                                         Design




                                                  Develop/
                   Train
                                                  Manage




                                          Test


© Network Intelligence India Pvt. Ltd.
EVOLVED PENETRATION
   TESTING

© Network Intelligence India Pvt. Ltd.
Secure Testing

                                           • Security testing options
                                              –   Blackbox
                                              –   Greybox
                                              –   Whitebox
                                              –   Source Code Review
                                           • OWASP Top Ten
                                             (www.owasp.org)
                                           • OWASP Testing Guide
Tools of the trade
    Open source – Wikto, Paros, Webscarab, Firefox plugins
    Commercial – Acunetix, Cenzic, Netsparker, Burpsuite



  © Network Intelligence India Pvt. Ltd.
Traditional vs. Risk-based Pentesting

          Traditional Pentesting               Risk-based Pentesting
   Focus is on technical                 Focus is on business risks
   vulnerabilities
   Requires strong technical know-       Requires both technical and business
   how                                   process know-how
   Having the right set of tools is      Understanding the workings of the
   critical                              business and applications is critical
   Is usually zero-knowledge             Requires a person who understands
                                         the business process to play a
                                         significant role – usually an insider
   Understanding the regulatory          Understanding the regulatory
   environment is good                   environment is mandatory




© Network Intelligence India Pvt. Ltd.
Traditional vs. Risk-based Pentesting

          Traditional Pentesting               Risk-based Pentesting
   Severity levels are based on          Severity levels are based on risk to
   technical parameters                  the business
   Risk levels in report are assigned    Risk levels in report reflect the levels
   post facto                            assigned prior to testing
   Test cases are build based on         Tests cases additionally build on risk
   testing methodologies or generic      scenarios
   testing processes
   Audience for the report is usually    Audience for the report also includes
   the IT and Security teams             the business process owners and
                                         heads of departments




© Network Intelligence India Pvt. Ltd.
GROUND REALITIES!


© Network Intelligence India Pvt. Ltd.
Ground realities
    • Business priorities
          – Expand, grow, market share!!
    • Developer illiteracy
          – Unaware of security implications
          – Shortcut fixes
    • Vendor apathy
          – Problem re-enforced by weak contracts
    • Unclear budgets
          – Lip service by management towards information
            security
          – CISO left fighting the battle alone without
            adequate resources
© Network Intelligence India Pvt. Ltd.
Use Triage

   STRATEGIZE!


© Network Intelligence India Pvt. Ltd.
Sample Strategies


                                                            Implement &
                                               In-house
                                                           Enforce Internal
                                              Developed
                                                                SLAs

                         Claims Processing
                                                           Regular Secure
ATLAS                     – Agents Access
                                                           Coding Training
                            Over Internet

                                                Active      Emphasis on
                                             Development   Secure Coding
                                                Team         Libraries


                                                           Secure Hosting




© Network Intelligence India Pvt. Ltd.
Take-Aways
       • Mindset change – most importantly of the business
         owners’!
             – Data protection does matter!
             – It is NOT simply a technology issue
             – ISO 27001 is not the answer
       • Implement application security in a comprehensive,
         cohesive and consistent manner
       • Evangelize constantly!
       • Demonstrate impact – always in business terms
       • Strategize – you can’t protect everything all the
         time
       • Leverage regulatory and legal requirements


© Network Intelligence India Pvt. Ltd.
Ensure – this never happens!




© Network Intelligence India Pvt. Ltd.
Questions?
                         kkmookhey@niiconsulting.com
                                @kkmookhey
                     http://www.linkedin.com/kkmookhey




                                 THANK YOU!


© Network Intelligence India Pvt. Ltd.

More Related Content

PDF
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
PDF
GTB Data Loss Prevention
PDF
Nephos technologies lee_biggenden_c_expo13_v2.0
PPTX
Hp Fortify Pillar
PPTX
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
PDF
IRJET- RFID Based Security Guard System using GSM
PDF
Gtb Dlp Suite Presentation
PDF
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
GTB Data Loss Prevention
Nephos technologies lee_biggenden_c_expo13_v2.0
Hp Fortify Pillar
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
IRJET- RFID Based Security Guard System using GSM
Gtb Dlp Suite Presentation
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...

What's hot (17)

PDF
Tsensors San Diego Sandhi Bhide - Nov 12-13 - Final
PPT
RFID-SECURITY_Vatsalya
PDF
It's 2012 and My Network Got Hacked - Omar Santos
PDF
iScan Online - PCI DSS Mobile Task Force
PDF
ISC2014 Beijing Keynote
PPTX
GTB DLP Suite Presentation
PDF
Tutor Web 2.0 World
PPT
Best practices in NIPS - IDC Sofia - March 2010
PPT
Use GFA To Make Someone Fall In Love With You
PDF
Xfocus xcon 2008_aks_oknock
PDF
Keynote fx try harder 2 be yourself
PPTX
Anatomy of an Attack
PDF
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
PPT
Authentication Technologies
PDF
Modern Lessons in Security Monitoring
PDF
Software Compliance Management Overview
PDF
OMG DDS Security Standard
Tsensors San Diego Sandhi Bhide - Nov 12-13 - Final
RFID-SECURITY_Vatsalya
It's 2012 and My Network Got Hacked - Omar Santos
iScan Online - PCI DSS Mobile Task Force
ISC2014 Beijing Keynote
GTB DLP Suite Presentation
Tutor Web 2.0 World
Best practices in NIPS - IDC Sofia - March 2010
Use GFA To Make Someone Fall In Love With You
Xfocus xcon 2008_aks_oknock
Keynote fx try harder 2 be yourself
Anatomy of an Attack
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
Authentication Technologies
Modern Lessons in Security Monitoring
Software Compliance Management Overview
OMG DDS Security Standard
Ad

Viewers also liked (8)

PDF
Introduction to Session Management Dana Al-abdulla
PDF
Implementing a comprehensive application security progaram - Tawfiq
PDF
You installed what Thierry Sans
PDF
Owasp qatar presentation top 10 changes 2013 - Tarun Gupta
PDF
Securing the channel - Tarkay Jamaan
PDF
Secure management of credentials - Zouheir Abdulla
PPTX
Defending Web Applications: first-principles- Jason Lam
PDF
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Introduction to Session Management Dana Al-abdulla
Implementing a comprehensive application security progaram - Tawfiq
You installed what Thierry Sans
Owasp qatar presentation top 10 changes 2013 - Tarun Gupta
Securing the channel - Tarkay Jamaan
Secure management of credentials - Zouheir Abdulla
Defending Web Applications: first-principles- Jason Lam
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Ad

Similar to Sql injection to enterprise Owned - K.K. Mookhey (20)

PDF
Application security enterprise strategies
PDF
Data Leakage Prevention - K. K. Mookhey
PPTX
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
PDF
Security For Free
PDF
Bar Camp 11 Oct09 Hacking
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PDF
IBM InfoSphere Guardium overview
PDF
Planning Your Business Web Site
PPTX
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
PPTX
ISACA New York Metro April 30 2012
PPTX
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
PDF
Solving the enterprise security challenge - Derek holt
PPT
Get Ready for Web Application Security Testing
PDF
Data security in cloud
PPTX
Ulf mattsson webinar jun 7 2012 slideshare version
PPTX
Threat modeling the security of the enterprise
PPT
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
PPT
Security Compliance Web Application Risk Management
PDF
Mis 2
PDF
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Application security enterprise strategies
Data Leakage Prevention - K. K. Mookhey
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Security For Free
Bar Camp 11 Oct09 Hacking
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IBM InfoSphere Guardium overview
Planning Your Business Web Site
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
ISACA New York Metro April 30 2012
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Solving the enterprise security challenge - Derek holt
Get Ready for Web Application Security Testing
Data security in cloud
Ulf mattsson webinar jun 7 2012 slideshare version
Threat modeling the security of the enterprise
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Security Compliance Web Application Risk Management
Mis 2
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
MYSQL Presentation for SQL database connectivity
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Big Data Technologies - Introduction.pptx
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
Dropbox Q2 2025 Financial Results & Investor Presentation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
A comparative analysis of optical character recognition models for extracting...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Programs and apps: productivity, graphics, security and other tools
MYSQL Presentation for SQL database connectivity
MIND Revenue Release Quarter 2 2025 Press Release
Network Security Unit 5.pdf for BCA BBA.
sap open course for s4hana steps from ECC to s4
Big Data Technologies - Introduction.pptx
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Weekly Chronicles - August'25-Week II
Digital-Transformation-Roadmap-for-Companies.pptx

Sql injection to enterprise Owned - K.K. Mookhey

  • 1. People Technology Processes Standards SQL Injection To Enterprise 0wned K. K. Mookhey, CISA, CISSP, CISM, CRISC
  • 2. Introduction • Founder, Principal Consultant – Network Intelligence India Pvt. Ltd. – Institute of Information Security • CISA, CISSP, CISM, CRISC • Penetration testing, Security Auditing, Forensics, Compliance, Problem-solving • ICICI Bank, BNP Paribas, Morgan Stanley, United Nations, Indian Navy, DRDO, and hundreds of other clients over a decade of experience • Speaker at Blackhat, Interop, IT Underground, OWASP Asia, SecurityByte, Clubhack, Nullcon, ISACA, and numerous others © Network Intelligence India Pvt. Ltd.
  • 3. Agenda • Introduction & Case Studies • Risk-based Penetration Testing • Solutions • Strategies • Take-Aways © Network Intelligence India Pvt. Ltd.
  • 4. THE BIGGEST HACK IN HISTORY © Network Intelligence India Pvt. Ltd.
  • 5. Gonzalez, TJX and Heart-break-land • >200 million credit card number stolen • Heartland Payment Systems, TJX, and 2 US national retailers hacked • Modus operandi – Visit retail stores to understand workings – Analyze websites for vulnerabilities – Hack in using SQL injection – Inject malware – Sniff for card numbers and details – Hide tracks © Network Intelligence India Pvt. Ltd.
  • 6. The hacker underground • Albert Gonzalez – a/k/a “segvec,” – a/k/a “soupnazi,” – a/k/a “j4guar17” • Malware, scripts and hacked data hosted on servers in: – Latvia – Netherlands Ukraine New Jersey • IRC chats California – March 2007: Gonzalez “planning my second phase against Hannaford” – December 2007: Hacker P.T. “that’s how [HACKER 2] hacked Hannaford.” © Network Intelligence India Pvt. Ltd.
  • 7. Where does all this end up? IRC Channels #cc #ccards #ccinfo #ccpower #ccs #masterccs #thacc #thecc #virgincc • Commands used on IRC – !cardable – !cc, !cclimit, !chk, !cvv2, !exploit, !order.log, !proxychk © Network Intelligence India Pvt. Ltd.
  • 8. TJX direct costs $200 million in fines/penalties $41 million to Visa $24 million to Mastercard © Network Intelligence India Pvt. Ltd.
  • 9. Cost of an incident • $6.6 million average cost of a data breach • From this, cost of lost business is $4.6 million • More than $200 per compromised record On the other hand: • Fixing a bug costs $400 to $4000 • Cost increases exponentially as time lapses © Network Intelligence India Pvt. Ltd.
  • 10. HOW THE COOKIE CRUMBLES © Network Intelligence India Pvt. Ltd.
  • 11. © Network Intelligence India Pvt. Ltd.
  • 12. © Network Intelligence India Pvt. Ltd.
  • 13. © Network Intelligence India Pvt. Ltd.
  • 14. © Network Intelligence India Pvt. Ltd.
  • 15. © Network Intelligence India Pvt. Ltd.
  • 16. © Network Intelligence India Pvt. Ltd.
  • 17. © Network Intelligence India Pvt. Ltd.
  • 18. © Network Intelligence India Pvt. Ltd.
  • 19. Betting blind!  DB Name  Table Names  User IDs  Table Structure  Data © Network Intelligence India Pvt. Ltd.
  • 22. Technology Solutions • Encryption • Web Application Firewalls • Source Code Review Solutions • Security Testing Suites • Data Leakage Prevention • Privileged Identity Management • Web Access Management • Information Rights Management • Database Security Solutions © Network Intelligence India Pvt. Ltd.
  • 23. Before we get to the technology… © Network Intelligence India Pvt. Ltd.
  • 24. Application Security – Holistic Solution Design Develop/ Train Manage Test © Network Intelligence India Pvt. Ltd.
  • 25. EVOLVED PENETRATION TESTING © Network Intelligence India Pvt. Ltd.
  • 26. Secure Testing • Security testing options – Blackbox – Greybox – Whitebox – Source Code Review • OWASP Top Ten (www.owasp.org) • OWASP Testing Guide Tools of the trade Open source – Wikto, Paros, Webscarab, Firefox plugins Commercial – Acunetix, Cenzic, Netsparker, Burpsuite © Network Intelligence India Pvt. Ltd.
  • 27. Traditional vs. Risk-based Pentesting Traditional Pentesting Risk-based Pentesting Focus is on technical Focus is on business risks vulnerabilities Requires strong technical know- Requires both technical and business how process know-how Having the right set of tools is Understanding the workings of the critical business and applications is critical Is usually zero-knowledge Requires a person who understands the business process to play a significant role – usually an insider Understanding the regulatory Understanding the regulatory environment is good environment is mandatory © Network Intelligence India Pvt. Ltd.
  • 28. Traditional vs. Risk-based Pentesting Traditional Pentesting Risk-based Pentesting Severity levels are based on Severity levels are based on risk to technical parameters the business Risk levels in report are assigned Risk levels in report reflect the levels post facto assigned prior to testing Test cases are build based on Tests cases additionally build on risk testing methodologies or generic scenarios testing processes Audience for the report is usually Audience for the report also includes the IT and Security teams the business process owners and heads of departments © Network Intelligence India Pvt. Ltd.
  • 29. GROUND REALITIES! © Network Intelligence India Pvt. Ltd.
  • 30. Ground realities • Business priorities – Expand, grow, market share!! • Developer illiteracy – Unaware of security implications – Shortcut fixes • Vendor apathy – Problem re-enforced by weak contracts • Unclear budgets – Lip service by management towards information security – CISO left fighting the battle alone without adequate resources © Network Intelligence India Pvt. Ltd.
  • 31. Use Triage STRATEGIZE! © Network Intelligence India Pvt. Ltd.
  • 32. Sample Strategies Implement & In-house Enforce Internal Developed SLAs Claims Processing Regular Secure ATLAS – Agents Access Coding Training Over Internet Active Emphasis on Development Secure Coding Team Libraries Secure Hosting © Network Intelligence India Pvt. Ltd.
  • 33. Take-Aways • Mindset change – most importantly of the business owners’! – Data protection does matter! – It is NOT simply a technology issue – ISO 27001 is not the answer • Implement application security in a comprehensive, cohesive and consistent manner • Evangelize constantly! • Demonstrate impact – always in business terms • Strategize – you can’t protect everything all the time • Leverage regulatory and legal requirements © Network Intelligence India Pvt. Ltd.
  • 34. Ensure – this never happens! © Network Intelligence India Pvt. Ltd.
  • 35. Questions? kkmookhey@niiconsulting.com @kkmookhey http://www.linkedin.com/kkmookhey THANK YOU! © Network Intelligence India Pvt. Ltd.