Archive for the ‘Allgemein’ Category

Joxean Koret released a whitepaper about Oracle Database Vault: Design Failures

Montag, Oktober 29th, 2007

Joxean Koret just released a whitepaper about Design Failures in Oracle Database Vault.

Joxean describes Oracle Database Vault (DBV) in his paper as „war against DBAs“ and explains various ways to bypass DBV on OS / file system level (e.g. trojanized oci library, backup, rootkits, …). Joxean is also talking about is the ancient problem „Quis custodiet ipsos custodes“ („Who will guard the guardians“ or „Who controls the police“). The solution for this problem is always the concept of segregation of duties (3 accounts instead of the powerful DBA). It’s clear that the current version of DBV has still many bugs (there are many open bugs from various companies unfixed).

I think this whitepaper shows a common misunderstanding of the product DBV itself. DBV was never designed to protect against attacks on OS/Filesystem level (e.g. it’s possible to disable DBV on OS level for applying patches). It’s just a framework to build more secure database systems together with other products like TDE, ASO, … together with a good architecture (apps, auditing, backup, …)

Inguma – Free Oracle Penetration Toolkit from Joxean Koret

Samstag, Oktober 20th, 2007

Joxean Koret released version 0.05 of his free penetration toolkit called Inguma. This tool is also implementing an exploit for one of the bugs (LT.FINDRICSET) fixed in the October 2007 CPU.

The name Inguma is coming from the basque god of dreams who kills people while sleeping and, also, the one who make the nightmares.

Inguma, written in Phython, supports different systems (e.g. Oracle, SQL Server, SSH, Firewalls). The following features are Oracle specific:

* Added one exploit for the vulnerability in SYS.LT.FINDRICSET (Oracle CPU Oct. 2007).
* Added module „bruteora“ to brute force Oracle servers. It will check
for every (commonly) possible user or for an specified user.
* Added a tool to crack MD5 hashes using freely available rainbow tables.
* Added module „sidguess“ to guess the SID of an Oracle Database instance.
* Added a password cracker for Oracle11g.
* Enhanced the Oracle PL/SQL Fuzzer. Now, if you redirect the output
only the vulnerabilities found are logged, all the rest of the output
are written to stderr.

Here a screenshot from the tool on my Backtrack 2 system:

Inguma Screenshot 1

Well done Joxean.

GOSS – GUI Oracle scanner

Sonntag, Oktober 14th, 2007

From time to time I’m doing research on Russian websites (with Google Translate) because you can find interesting information and tools. Last week I found a small program Oracle scanner called goss a GUI Oracle Scanner.

GUI Oracle Scanner

This tools contains features like getting the SID (similar to sidguess), password guessing, retrieve password hashes from the database, …

GUI Oracle Scanner II

The output is displayed in a new window.

GUI Oracle Scanner III

Some of the features in this tool where not working properly against my test databases.

Partnership between Red-Database-Security GmbH and PeteFinnigan.com Ltd.

Dienstag, August 21st, 2007

Red-Database-Security GmbH in Germany and PeteFinnigan.com Limited in the UK are pleased to announce an exclusive partnership to promote and sell services / training and products to give customers the best choices in securing Oracle databases. Pete Finnigan and Alex Kornbrust are both world leaders in the field of securing Oracle databases and this exclusive partnership will provide a stronger combined proposition for customers of both companies. Alex and Pete are pleased to announce an exclusive and exciting limited opportunity to attend a 5 day Oracle Anti Hacker training in London from October 29th to November 2nd. The places are limited so don’t miss this unique opportunity. See www.petefinnigan.com and www.red-database-security.com for more details and to register.“

Aaron Newman criticize Oracle patch policies

Donnerstag, Mai 24th, 2007

The interview „Security guru blasts Oracle’s patching policies“ with Aaron Newman from Application Security Inc. descibes the problems with patching Oracle databases (long time to patch, backports, …).