Application Security // Database Security
10/15/2013
05:34 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

Capturing The Flag, SQLi-Style

Black Hat SQL injection workshop instructor develops real-world SQL injection sandbox simulator, invites public for capture the flag event later this month

Penetration tester and long-time security professional Sumit "Sid" Siddharth is a big believer in the importance of practicing exploitation to gain better insight about vulnerabilities.

"The only way you can understand the true impact of vulnerabilities is by practicing exploitation. Even vulnerability identification goes hand-in-hand with exploitation," says Siddharth, founder of NotSoSecure and a frequent Black Hat speaker and trainer. "Sometimes identifying the vulnerability is really difficult, and it's only when you know advanced exploitation techniques that you can do so. In my experience pen testing for 10 years now, the biggest takeaway is that these two things feed into each other."

Working as a frequent instructor of workshops for Black Hat and classes around the world teaching the art of injection exploits -- including next month's Black Hat Seattle -- Siddharth felt students could have used more hands-on training during the class; there was very little opportunity to practice the principles he teaches once they were done.

[Your organization's been breached. Now what? See Establishing The New Normal After A Breach.]

"In a one-day class on SQL injection, there's only so much you can cover," he says. "We have some slides on advanced topics, but we never have time to cover them through practical demonstration."

That bugged him enough to develop a real-world website and database environment simulator he calls SQL Injection Labs, a platform that gives anyone with a subscription access to wreak havoc via SQLi without worrying about legal trouble or client engagement issues. It's like a virtual movie set where visitors are invited to smash up the storefront windows and pick the locks to learn the craft of breaking in.

Loaded with the similar types of vulnerabilities, software setups, and situations that have been exploited in high-profile compromises of years past, the platform will be available for public use in a free capture-the-flag (CTF) event Siddharth says hopes will raise awareness about the platform and the danger of SQLi vulnerabilities among IT professionals and the businesses they work for.

A frequent participant in other CTF events held across the industry, Siddharth says this one is designed to not be insanely difficult or easy so that not everyone can get a flag, but it won't be limited to just one or two participants, either.

"Our intention is to put together a real-life simulation -- something you would find in an actual pen test, up for capture-the-flag," Siddharth says, explaining that CTF events made too difficult eliminate the reality of the scenarios. "It's all good practicing and training in a capture-the-flag, but if your hacking of the systems doesn't really mimic all the applications or scenarios in real life, then that really doesn't appeal so much."

With already more than 300 participants signed up, the prizes will be hotly contested. Among them is one free ticket to AppSec USA, along with some subscriptions to SQL Injection Labs.

As for the platform on which the event is built, Siddharth says it is already growing momentum. After just about two weeks online, approximately 50 users have signed up, many of whom have already spent hours working problems, he says.

With more than 20 challenges, many including multiple objectives, the platform is being run in conjunction with SecurityTube. Within the environments, Siddharth covered MS-SQL, MYSQL, Oracle, and Postgres, with plans to also add NoSQL databases such as Mongo DB in the works. Because the idea is to help users of all ability levels learn more, challenges are broken into three difficulty levels, with a built-in "answer key" of sorts, he says.

"If people are starting out in their career and haven't mastered the art yet, we provide them with a solution they can follow, along with screenshots of what they should see on the screen," he says. "We also provide a full video walk-through of how a particular challenge can be solved."

On the other end of the spectrum are some real head-scratchers.

"We've also put together some really nice examples where identifying the vulnerability is really difficult, and we've asked people to find the needle in the haystack because that's how websites get compromised at the end of the day," Siddharth says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.