Good Idea - What's the problem? • Microsoft recommends Windows Authentication Mode
9
Mode Guidelines
10
SQL Server Roles
11
C2 Level Auditing
12
Some Other SQL 2K Goodies
13
The Bad
14
Target Acquisition
15
Newsgroups
16
SQL Scanning
17
Broadcast Discovery
18
SQL Server Discovery
19
SQL Ping Utility
20
Account Acquisition (cont.)
21
Source Code Disclosure
22
Privilege Escalation (cont.)
23
Other Potential Pitfalls
24
They're in - Now What?
25
Your Defenses
26
Section 2 Conclusion
27
The Ugly
28
Scope of SQL Injection
29
SQL Injection Example 2
30
Live Demonstration
31
SQL Injection Samples
32
SQL Injection - Tricks
Description:
Explore SQL security vulnerabilities and best practices in this Black Hat USA 2001 conference talk by Chip Andrews. Delve into the SQL Server security framework, authentication modes, and roles. Learn about C2 level auditing and other SQL 2000 security features. Examine common attack vectors, including target acquisition methods, SQL scanning techniques, and account acquisition strategies. Understand the risks of source code disclosure and privilege escalation. Discover defensive measures to protect against SQL attacks. Gain insights into the scope and impact of SQL injection, with live demonstrations and practical examples. Master advanced SQL injection tricks to enhance your understanding of database security threats and countermeasures.