Beruflich Dokumente
Kultur Dokumente
in
www.chmag.in
VERSION: Versions
applicable for;
Introduction
Abstract
Following template will be used for each
parameter:
WHAT: This will explain what the
parameter is used for and where it can be
found;
WHY: The reason you should consider
changing/not-changing it;
www.chmag.in
of
Oracle
it
is
security
Recommended
settings:
Table
of
recommended settings mostly combined for
multiple parameters that are of similar type.
(wherever applicable);
Solution
As mentioned above lets start with
important OS security parameters in Oracle
Database:
O7_DICTIONARY_ACCESSIBILITY
WHAT: Controls restrictions on
SYSTEM privileges. If the parameter is
set to true, access to objects in the SYS
schema is allowed. The default setting is
false.
P.S: System privileges that allow access
to objects in "any schema" are not
allowed access to objects in the SYS
schema
WHY:
Unauthorized/
Inadvertent
access and changes to SYSTEM
Thumb-rule: Least privileges
VERSION: ALL
Command: Login as SYSDBA and
execute ALTER SYSTEM command as:
ALTER
SYSTEM
SET
O7_DICTIONARY_ACCESSIBILITY =
true SCOPE=spfile
_TRACE_FILES_PUBLIC
parameter
to
TRUE.
Newly
generated trace will have read
permission granted to other users
and public.
USER_DUMP_DEST
www.chmag.in
SET
UTL_FILE_DIR
WHAT: Specifies one or more
directories that Oracle should use for
PL/SQL file I/O. Value should never be
set to *
WHY: All users can read or write to all
files specified by this parameter.
Therefore this value means that the
package UTL_FILE can be used to write
to any directory in the system where
oracle has write permissions. GREAT!!
VERSION: ALL
Commands: The parameter can be set
in the initialisation file as utl_file_dir =
'directory'
SET
TRANSACTION_AUDITING
WHAT: TRANSACTION_AUDITING
to be set to TRUE. Oracle generates a
special redo record that contains the
user logon name user name the session
ID some operating system information
and client insformation. For each
successive transaction. Oracle generates
a record that contains only the session
ID. These subsequent records link back
to the first record which also contains
the session ID
WHY: Redo log will not be generated if
set to false. Useful if you are using redo
log analysis tools.
VERSION: ALL
Commands: This parameter can be set
at system level
www.chmag.in
E.g.
ALTER
SYSTEM
SET
TRANSACTION_AUDITING = TRUE;
REMOTE_OS_AUTHENT
WHAT:
REMOTE_OS_AUTHENT
specifies whether remote clients will be
authenticated with the value of the
OS_AUTHENT_PREFIX parameter.
WHY: Allowing the OS to control OS
authentication without intervention can
be very risky.
VERSION: ALL
Commands: This parameter can be set
at system level
E.g.
ALTER
SYSTEM
SET
REMOTE_OS_AUTHENT= FALSE;
P.S:
The
remote_os_authent
parameter has been deprecated in
Oracle 11g, and a safer method is
now used.
These are some of the important OS
parameters; we will focus on permissions on
Oracle tables and packages in next article.
About the Author
Ajinkya Patil
http://avsecurity.in
DSCI Security
Framework for ISO
27001 Implementers
http://www.dsci.in/about-us
www.chmag.in
www.chmag.in
Image Credits
www.chmag.in
M.S.Sripati, CISA
maanav.saavadhaan@gmail.com
Sripati is an information security process
consultant & software developer with an overall
experience of 8+ years, doing ISO 27001 & HIPA
compliant
ISMS
Implementation,
Risk
Assessment and Management. He is a self-driven
professional who continuously keeps himself
abreast of the latest happenings & regulations by
being part of & participating in various
information security forums. Check out his site
(www.sripati.info) to know more.
3) INVITE
Invite module is prepared to test call
features of target SIP services. Invite
spoofing, billing or CDR bypass using
custom proxy headers, Invite based DoS
attacks and sample call tests can be
performed using Invite module.
4) ENUMERATOR
Enumerator module is prepared to
enumerate of users and internal
numbers of target SIP servers.
Enumeration step of the SIP pen-test
could be performed with a user list file
or numeric user range.
5) BRUTE FORCE
Description of Modules:
1) OPTION
Options module can be used to discover
target SIP services and devices.
2) REGISTER
Register module can be used to discover
target SIP services and devices too. Also
Register module can register a client, a
service or test a valid account.
www.chmag.in
6) MESSAGE
Message module is prepared to test
message features of SIP services.
Message support is required to test
value added services and service
operations of SIP operators. It supports
message spoofing, simple fuzz features
and message based DoS attacks.
7) PORT SCANNER
Port
scanner
module
can
test
registration features of SIP proxies. It
can perform SIP bounce attacks to
discover 3rd party SIP servers using
target SIP services.
8) DDOS AMPLIFICATION
DDoS testing module prepared to
initiate DDoS attack demos based on
SIP error messages. SIP servers send
error messages 10+ times for bogus
requests. DDoS module can send IP
spoofed SIP requests to target SIP
services and initiate an attack to 3rd
party victims.
9) PROXY
Proxy module is prepared to test SIP
clients and SIP services with MITM
proxy features. It supports basic search
& replace functions to test SIP services.
Also it can be used to add new features
to SIP clients, such as invite spoofing,
proxy headers and fuzzing.
10) TRUST ANALYZER
Trust analyzer module is prepared to
test trust relationships of SIP trunks.
SIP trunks trust each other in UDP
based communications. This module can
send IP spoofed invite or message
requests to targets to determine trusted
www.chmag.in
Fatih Ozavci
fatih.ozavci@gamasec.net
Fatih Ozavci is Sr. Security Consultant of
Sense of Security, Australia. He is author of
Viproy VoIP Penetration and Exploitation
Testing Kit, also he has published a paper
about Hacking of SIP Trust Relationships.
He has discovered many unknown private
security vulnerabilities, design and protocol
flaws in VoIP environments for his
customers. Also he analyzes VoIP design and
implementation flaws, and helps to improve
VoIP infrastructures as a service. While
Fatih's primary expertise is in VoIP
penetration testing, mobile application
testing and IPTV testing, he is also well
versed at network penetration testing, web
application testing, reverse engineering,
fuzzing and exploit development. He is one
of the speakers of Defcon 21, Blackhat 2013,
Cluecon 2013 and Athcon 2013.
Network Security
Basics Part-2
This section will demonstrate common
information security problems mapped with
OSI seven layers and evaluate the same for
solutions to secure the organisations
information resources.
www.chmag.in
Loss of Power
Loss of Environmental Control
Physical Theft of Data and Hardware
Layer
Vulnerability
Overloading
of
transport-layer
mechanisms such as port numbers
limit the ability to effectively filter
and qualify traffic.
Transmission mechanisms can be
subject to spoofing and attack based
on crafted packets and the educated
guessing of flow and transmission
values, allowing the disruption or
seizure
of
control
of
communications.
www.chmag.in
www.chmag.in
Anagha Devale-Vartak
http://avsecurity.in
Anagha is an Information Security
professional
with
experience
in
Vulnerability
Assessment,
Web
Application Audit, Database Audit,
Antivirus Review, and Compliance
Audit. She holds CCNA and CEH
certification.