The Making of the second SQL injection Worm

DEF CON 17

Presented by: Mike Kershaw (Dragorn)
Date: Saturday August 01, 2009
Time: 15:00 - 15:20
Location: Turbo/Breakout Track
Track: Turbo/Breakout

The "turbo" talk will focus on exploiting SQL injections in web applications with oracle back-end. Mostly exploiting Oracle sql injections in web applications is considered to be restricted to extraction of data only. Oracle database does not offer hacker friendly functionalities such as openrowset or xp_cmdshell for privilege escalation and O.S code execution. Further, as web API do not support execution of multiple query in single statement, the exploitation is further restricted. The Talk will highlight attack vector to achieve privilege escalation (from Scott to SYS) and O.S code execution by exploiting Oracle SQL injections in web applications. Further, there will be demo of how a worm could target an Oracle back-end just as it targeted the SQL server applications.

Sumit Siddharth

<strong> Sumit &quot;sid&quot; Siddharth</strong> works as a senior IT security consultant for Portcullis Computer Security in the UK. He has been a speaker at many security conferences including Troopers, OWASP Appsec and IT Underground. He also runs the popular IT security blog www.notsosecure.com.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats