Penetration Testing mailing list archives
Re: Determining the encryption used
From: Dotzero <dotzero () gmail com>
Date: Fri, 12 May 2006 16:39:47 -0400
On 5/11/06, John Madden <chiwawa999 () yahoo com> wrote:
Hi,
You've actually given us a few useful clues to approaching this issue.
While doing a pen-test I came across a database with encrypted fields and I was curious to try and see what I would do with it.
The fact that you came across the database and know the files are encrypted implies that you have gained access to the box itself. The first question I would have is whether you can determine if the database application itself is performing the encryption or if the encryption is being done by an application external to the database. You could try sniffing the interface if someone has been kind enough to leave something like tcpdump or snoop (I'm showing my age <G>) on the box. If you are a little more brazen, use your own tool. You might do some poking around. I have known trusting DBAs to leave the keys laying around somewhere in an obscure table or somewhere on the box (I can hear the gasps of horror across the wire). You have already received some answers about attacking the encryption directly. Personally, I find it easier to attack the implementation/environment rather than the encryption itself. Once you break the implementation you can get at what you want. Just my 2 cents. ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Re: Determining the encryption used, (continued)
- Re: Determining the encryption used Tim (May 12)
- Re: Determining the encryption used Byron Sonne (May 12)
- Re: Determining the encryption used Peter Kosinar (May 12)
- Re: Determining the encryption used Tonnerre Lombard (May 12)
- Re: Determining the encryption used Tim (May 12)
- Re: Determining the encryption used Phoebe Tunstall (May 12)
- Re: Determining the encryption used Peter Kosinar (May 13)
- Re: Determining the encryption used Tim (May 13)
- Re: Determining the encryption used Tim (May 12)
- RE: Determining the encryption used Sahir Hidayatullah (May 12)
- Re: Determining the encryption used thomas springer (May 12)
- Re: Determining the encryption used Dotzero (May 12)
- Re: Determining the encryption used iccs-abr (May 12)
- RE: Determining the encryption used Bob Bell (rtbell) (May 12)
- Re: Re: Determining the encryption used cwright (May 12)