SlideShare a Scribd company logo
NoSQL – No
Security?
A way to lose even more stuff
Gavin Holt (@GavinHolt)
What we will cover today
What is Big Data?
What is NoSQL?
Why NoSQL Security is an issue
NoSQL Vulnerabilities
Securing NoSQL Installations
What is Big Data?
Datasets that are so large or complex that they are
difficult to process using traditional database
processing applications
2.5 quintillion bytes
(1followed by 18 zeros)
Data being generated every
day (IBM)
2.5 Petabytes
(1048576Gigabytes)
The total size of Walmarts
transaction database (The
Economist)
40 Terabytes per second
Data generated by
experiments on the LHC at
CERN
(The Economist)
72 Hours per Minute
Video uploaded to YouTube
(Google Inc.)
That is a lot of data!
Try running any of them in MS
Access
What is NoSQL?
“Not Only SQL”
Umbrella Term
Type of System – Not a
Product
Not the Traditional Relational Model
Generally don’t use tables
Optimised for appends and retrieves
Do very little other than record
storage
Highly Scalable & Very Quick
This is all about speed and
size
Why use NoSQL?
Why the Big Data/NoSQL Hype?
Eventual Consistency
Delays in writing across nodes
slow down your application
User Updates Social Network
Social Network uses a load balancer
Writes don’t propagate immediately
Data is now inconsistent
Reading Stale Data
Users now being served old data from nodes that haven’t been updated
Amore serious example
Data needs to be propagated quickly – NoSQL allows for that
Diagram from Adobe Security Labs
NoSQL Vulnerabilities
How do these compare to traditional databases?
The Developer
By Laziness or Ignorance
Little to no Authentication
“Trusted Environments”
NoSQL Injection
Helpful isn’t always useful
Flattening associative arrays
MongoDB Example
http://example.com/login.php?username=admin&passwd=mysuperpassword
MongoDB Example
http://example.com/login.php?username=admin&passwd[$ne]=1
MongoDB Example
http://example.com/login.php?username=admin&passwd[$ne]=1
MongoDB Example
MYSQL NOSQL
MongoDB Example
MYSQL NOSQL
Server Side Javascript Injection
Server Side Javascript Injection
Server Side Javascript Injection
Server Side Javascript Injection
Server Side Javascript Injection
Server Side Javascript Injection
Example of an Attack
CSFR can be used to bypass firewalls
Diagram from Adobe Security Labs
POST is all an Attacker needs
Inserting Data
Inserting Script Data
Execute any REST command from inside the firewall
Securing NoSQL
One does not simply secure NoSQL </meme>
Sanitize Inputs
Don’t trust users (or other
systems!)
Be in control of your query building
Don’t simply concatenate user
input
Check how your solution works
Read the manual
All other SQL Best Practice
These aren’t different attack
vectors – just new
Questions?
Twitter: @GavinHolt
LinkedIn: http://uk.linkedin.com/in/gavinholt/
Email: gavin@gavin-holt.com
Around all day – Grab me for a chat.
NoSQL – No
Security?
A way to lose even more stuff
Gavin Holt (@GavinHolt)

More Related Content

PDF
NoSQL, no security?
PPTX
Exploiting NoSQL Like Never Before
PPTX
Securing Your MongoDB Deployment
PDF
NoSQL - No Security?
PDF
NoSQL, no SQL injections?
PPTX
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
PPTX
NoSQL Exploitation Framework
PDF
Engineering an Encrypted Storage Engine
NoSQL, no security?
Exploiting NoSQL Like Never Before
Securing Your MongoDB Deployment
NoSQL - No Security?
NoSQL, no SQL injections?
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
NoSQL Exploitation Framework
Engineering an Encrypted Storage Engine

What's hot (20)

PDF
The Unintended Risks of Trusting Active Directory
PPTX
Software Development in the Age of Breaches
PPTX
Securing Your MongoDB Implementation
PPTX
Beyond the Basics 4: How to secure your MongoDB database
PDF
Python & Cassandra - Best Friends
PDF
Do you lose sleep at night?
PDF
aclpwn - Active Directory ACL exploitation with BloodHound
PDF
Understanding the Solr Security Framekwork: Presented by Anshum Gupta, IBM
PDF
[Wroclaw #7] Why So Serial?
PDF
Unsafe SSL webinar
PPTX
PSConfEU - Offensive Active Directory (With PowerShell!)
PPTX
[Wroclaw #7] Security test automation
PPT
Webinar: Technical Introduction to Native Encryption on MongoDB
PPTX
[Wroclaw #7] AWS (in)security - the devil is in the detail
PPTX
Caching in Windows Azure
PPTX
SANS @Night Talk: SQL Injection Exploited
PPTX
Scale and Throughput @ Clicktale with Akka
PDF
High Performance Java EE with JCache and CDI
PDF
DevOpsDays - DevOps: Security 干我何事?
PDF
JavaCro'14 - Continuous deployment tool – Aleksandar Dostić and Emir Džaferović
The Unintended Risks of Trusting Active Directory
Software Development in the Age of Breaches
Securing Your MongoDB Implementation
Beyond the Basics 4: How to secure your MongoDB database
Python & Cassandra - Best Friends
Do you lose sleep at night?
aclpwn - Active Directory ACL exploitation with BloodHound
Understanding the Solr Security Framekwork: Presented by Anshum Gupta, IBM
[Wroclaw #7] Why So Serial?
Unsafe SSL webinar
PSConfEU - Offensive Active Directory (With PowerShell!)
[Wroclaw #7] Security test automation
Webinar: Technical Introduction to Native Encryption on MongoDB
[Wroclaw #7] AWS (in)security - the devil is in the detail
Caching in Windows Azure
SANS @Night Talk: SQL Injection Exploited
Scale and Throughput @ Clicktale with Akka
High Performance Java EE with JCache and CDI
DevOpsDays - DevOps: Security 干我何事?
JavaCro'14 - Continuous deployment tool – Aleksandar Dostić and Emir Džaferović
Ad

Similar to NoSQL - No Security? - The BSides Edition (20)

PPTX
Introduction to NoSQL database technology
PDF
Considerations for using NoSQL technology on your next IT project - Akmal Cha...
PDF
Considerations for using NoSQL technology on your next IT project
PDF
Considerations for using NoSQL technology on your next IT project
PDF
Considerations for using NoSQL technology on your next IT project
PDF
Considerations for using NoSQL technology on your next IT project
DOCX
Unit II -BIG DATA ANALYTICS.docx
PPTX
UNIT-2.pptx
PDF
No Sql Databases
PDF
The NoSQL Movement
PPTX
NOSQL IN BIGDATA FOR PG STUDENTS FOR COL
PPTX
Introduction to NoSQL & Features of NoSQL.pptx
PPTX
NoSQLDatabases
PPTX
Introduction to NoSQL
PPTX
NoSQL: what does it mean, how did we get here, and why should I care? - Hugo ...
PPTX
Moving from SQL Server to MongoDB
PPTX
Nosql-Module 1 PPT.pptx
PPTX
Non relational databases-no sql
PPTX
UNIT II Evaluating NoSQL for various .pptx
PPTX
NoSQL.pptx
Introduction to NoSQL database technology
Considerations for using NoSQL technology on your next IT project - Akmal Cha...
Considerations for using NoSQL technology on your next IT project
Considerations for using NoSQL technology on your next IT project
Considerations for using NoSQL technology on your next IT project
Considerations for using NoSQL technology on your next IT project
Unit II -BIG DATA ANALYTICS.docx
UNIT-2.pptx
No Sql Databases
The NoSQL Movement
NOSQL IN BIGDATA FOR PG STUDENTS FOR COL
Introduction to NoSQL & Features of NoSQL.pptx
NoSQLDatabases
Introduction to NoSQL
NoSQL: what does it mean, how did we get here, and why should I care? - Hugo ...
Moving from SQL Server to MongoDB
Nosql-Module 1 PPT.pptx
Non relational databases-no sql
UNIT II Evaluating NoSQL for various .pptx
NoSQL.pptx
Ad

NoSQL - No Security? - The BSides Edition

Editor's Notes

  • #3: What is Big Data and why it is distinct from average sized DataWhat NoSQL Actually isWhy the issue of NoSQL Security should be important to DevelopersNoSQL Attack VectorsHow to secure NoSQL Deployments
  • #4: Buzzword
  • #9: Traditional Relational solutions not appropriate for this magnitude of Data
  • #39: Attacker compromised a user of the application using a CSFR, They execute the command on the DB on the Attackers behalf
  • #40: Post crap data into the databasePost Script data into the database – give yourself access to moreFull control, bypassing the firewall as you are using a trusted client