Oracle NoSpaces Exploit Versions: ALL |
---|
Overview |
One of the security industry's big money makers is monitoring SQL statements that for unusual behavior or for access to specific tables.
To evade these security tools those in the business of breaking into databases evolve techniques for hiding the details of the requests they are making to the database.
Three of those techniques are the Base64, CAST TO RAW, and the NoSpaces exploits (links at page bottom). Many of the more sophisticated security tools can now catch these three exploits but it is not hard to imagine numerous variations to evade existing capabilities. Be sure you learn, from the follow demos, how this works. Then do the same with the other two exploits. To secure your database you need to intentionally attempt these exploits as part of a sanctioned White Hat attack and see if your environment will alert you. |
Exploit Demo |
This demo consists of two attempts to execute the same SQL statement. The first is the statement written as it might be by a legitimate developer that wants to write clear, concise, and self-documenting code. The second performs the exact same action but attempts to evade a security tool's ability to audit and evaluate its intent. |
SQL*Plus: Release 19.0.0.0.0 - Production on Wed Aug 28 13:41:28 2019 |
Conclusion |
The Oracle Database interprets the comment tags /* and */ back-to-back as a single white space.
It is far easier to trap for the keyword "SELECT" and "FROM" than it is to instring these words from the interior of a long string.You are just trying to do your job. Some people's "job" is to find ways to evade your security measures. Investing time to understand these techniques and how they work, will make you better at evaluating what will protect your data and your databases. |
Related Topics |
Base64 Exploit |
Cast To RAW Exploit |
REPLACE Exploit |
Substitution Exploits |
TRANSLATE Exploit |
UTL_ENCODE |
UTL_I18N |
UTL_RAW |
WRAP Exploit |