How To Protect Oracle Database Vault
In Esteban Martinez Fayo's "Hacking and Protecting Oracle Database Vault" session at Black Hat USA in Las Vegas a couple weeks ago, he used several exploit methods that could be used to disable Oracle Data Vault. Each exploit provided an avenue by which he could hack the database. With each exploit he performed the same hack: rename the dynamically linked library that implemented all Oracle Database Vaults functions.
In Esteban Martinez Fayo's "Hacking and Protecting Oracle Database Vault" session at Black Hat USA in Las Vegas a couple weeks ago, he used several exploit methods that could be used to disable Oracle Data Vault. Each exploit provided an avenue by which he could hack the database. With each exploit he performed the same hack: rename the dynamically linked library that implemented all Oracle Database Vaults functions.These are known exploits, and in the case of the buffer overflow attack, a patched problem. The demonstration was not some tricky new exploit, but common attack vectors. The real point of the presentation is not about a particular exploit, but the fact that Database Vault functions could be removed entirely should any of these exploits -- or valid permissions -- be available. Once the DLL is renamed, the next database restart will occur normally, but the database will resume operation without Database Vault functions.
Some of the people I spoke with after the show did not understand how this could be the case, but unless you are looking at the log files to detect this type of system event, it will go entirely unnoticed. User access, DBA roles, and multifactor authentication requirements simply vanish.
My interest in pointing this out is not the novelty of the attack, but rather to point out that you probably have tools in your house to detect or even prevent this type of exploit. The presentation lacked some of the detection and prevention tactics, so I will mention a few here:
About the Author
You May Also Like
Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024