One-Day Trainings: Wednesday, October 24
This is a full day hands on training course which will typically target penetration testers, security auditors/administrators and even web developers to learn advanced exploitation techniques. SQL Injection, although now nearly 15 years old, still exists in over 30% of the web applications. This vulnerability could typically result in 3 scenarios:
- Authentication Bypass
- Extraction of arbitrary sensitive data from the database
- Access and compromise of the internal network.
To identify the true impact of this vulnerability it is essential that the vulnerability gets exploited to the full extent. While there is a reasonably good awareness when it comes to identify this problem, there are still a lot of grey areas when it comes to exploitation or even identifying complex vulnerabilities like a 2nd order injections. This training will target 3 databases (MS-SQL, Mysql, Oracle) and discuss a variety of exploitation techniques to exploit each scenario. The aim of the training course is to address the following:
- Identify the most complicated sql injections which are beyond the scope of any automated tool?
- Identify and Extract sensitive data from back-end database?
- Privilege Escalation within the database and extracting data with database admin privilege?
- OS code execution on these database server and use this as a pivot to attack internal network?
Sumit Siddharth (Sid) works as a Head of Penetration Testing for 7safe in the UK. He specializes in Web application and database security and has over 7 years of experience with IT security. Sid has been a speaker/trainer at many international conferences such as Black Hat, Defcon, Owasp, Troopers, Sec-T etc. He has been an author of several white-papers, tools and security advisories. Sid holds the prestigious CREST certification and also runs the popular IT security bloghttp://www.notsosecure.com. He is also a contributing author to the book SQL Injection:Attacks and Defense (2nd Edition).