Application Security // Database Security
10/15/2013
05:34 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%
Repost This

Capturing The Flag, SQLi-Style

Black Hat SQL injection workshop instructor develops real-world SQL injection sandbox simulator, invites public for capture the flag event later this month

Penetration tester and long-time security professional Sumit "Sid" Siddharth is a big believer in the importance of practicing exploitation to gain better insight about vulnerabilities.

"The only way you can understand the true impact of vulnerabilities is by practicing exploitation. Even vulnerability identification goes hand-in-hand with exploitation," says Siddharth, founder of NotSoSecure and a frequent Black Hat speaker and trainer. "Sometimes identifying the vulnerability is really difficult, and it's only when you know advanced exploitation techniques that you can do so. In my experience pen testing for 10 years now, the biggest takeaway is that these two things feed into each other."

Working as a frequent instructor of workshops for Black Hat and classes around the world teaching the art of injection exploits -- including next month's Black Hat Seattle -- Siddharth felt students could have used more hands-on training during the class; there was very little opportunity to practice the principles he teaches once they were done.

[Your organization's been breached. Now what? See Establishing The New Normal After A Breach.]

"In a one-day class on SQL injection, there's only so much you can cover," he says. "We have some slides on advanced topics, but we never have time to cover them through practical demonstration."

That bugged him enough to develop a real-world website and database environment simulator he calls SQL Injection Labs, a platform that gives anyone with a subscription access to wreak havoc via SQLi without worrying about legal trouble or client engagement issues. It's like a virtual movie set where visitors are invited to smash up the storefront windows and pick the locks to learn the craft of breaking in.

Loaded with the similar types of vulnerabilities, software setups, and situations that have been exploited in high-profile compromises of years past, the platform will be available for public use in a free capture-the-flag (CTF) event Siddharth says hopes will raise awareness about the platform and the danger of SQLi vulnerabilities among IT professionals and the businesses they work for.

A frequent participant in other CTF events held across the industry, Siddharth says this one is designed to not be insanely difficult or easy so that not everyone can get a flag, but it won't be limited to just one or two participants, either.

"Our intention is to put together a real-life simulation -- something you would find in an actual pen test, up for capture-the-flag," Siddharth says, explaining that CTF events made too difficult eliminate the reality of the scenarios. "It's all good practicing and training in a capture-the-flag, but if your hacking of the systems doesn't really mimic all the applications or scenarios in real life, then that really doesn't appeal so much."

With already more than 300 participants signed up, the prizes will be hotly contested. Among them is one free ticket to AppSec USA, along with some subscriptions to SQL Injection Labs.

As for the platform on which the event is built, Siddharth says it is already growing momentum. After just about two weeks online, approximately 50 users have signed up, many of whom have already spent hours working problems, he says.

With more than 20 challenges, many including multiple objectives, the platform is being run in conjunction with SecurityTube. Within the environments, Siddharth covered MS-SQL, MYSQL, Oracle, and Postgres, with plans to also add NoSQL databases such as Mongo DB in the works. Because the idea is to help users of all ability levels learn more, challenges are broken into three difficulty levels, with a built-in "answer key" of sorts, he says.

"If people are starting out in their career and haven't mastered the art yet, we provide them with a solution they can follow, along with screenshots of what they should see on the screen," he says. "We also provide a full video walk-through of how a particular challenge can be solved."

On the other end of the spectrum are some real head-scratchers.

"We've also put together some really nice examples where identifying the vulnerability is really difficult, and we've asked people to find the needle in the haystack because that's how websites get compromised at the end of the day," Siddharth says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2014-0778
Published: 2014-04-19
The TCPUploader module in Progea Movicon 11.4 before 11.4.1150 allows remote attackers to obtain potentially sensitive version information via network traffic to TCP port 10651.

CVE-2014-1974
Published: 2014-04-19
Directory traversal vulnerability in LYSESOFT AndExplorer before 20140403 and AndExplorerPro before 20140405 allows attackers to overwrite or create arbitrary files via unspecified vectors.

CVE-2014-1983
Published: 2014-04-19
Unspecified vulnerability in Cybozu Remote Service Manager through 2.3.0 and 3.x before 3.1.1 allows remote attackers to cause a denial of service (CPU consumption) via unknown vectors.

Best of the Web