Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Neil, a Certified Ethical Hacker (CEH) and Certified Hacking Forensic Investigator (CHFI): The biggest case of identity theft in US history

August 2009 by Neil, a Certified Ethical Hacker (CEH) and Certified Hacking Forensic Investigator (CHFI)

Following news this afternoon of a 130 million number credit card fraud perpetrated by just three individuals using a well-known hack method called ‘SQL Injection’, I wanted to put you in touch with Neil O’Neil, principle digital forensics investigator at secure card payment specialist The Logic Group for further comment and expert insight.

Neil, a Certified Ethical Hacker (CEH) and Certified Hacking Forensic Investigator (CHFI), says:

“Code weakness on e-commerce sites is the single greatest vulnerability exploited by hackers to directly compromise and illegally extract credit card and personal data online, so it comes as no surprise that it has been used to such dramatic effect in the case reported today.

“The problem is ‘SQL Injection’. If an SQL database cannot deal with escape characters* then it is vulnerable to the injection of variables and strings that will give hackers direct access to data. Hackers can extract data from a vulnerable database by simply heading onto the login page and entering an exact string of code. This string selects a particular user’s password and potentially their credit card details. This occurs because the input into the form in the webpage is unverified or unsanitised.

“To resolve SQL injection issues there needs to be specific lines of code that deal with escape characters. For all other code weaknesses it is best to ensure that all the website development complies with OWASP (Open Web Application Security Project), which provide guidelines to resolve all the major known web application vulnerabilities.”

O’Neil is also available to discuss how it is not only SQL mis-configurations that provide entry points into databases. According to O’Neil a significant number of the web applications used to process data and user input is based on proprietary code (Java, PHP, Perl, C##, ASP etc) and O’Neil warns that developers that do not write the code with all the appropriate security principles embedded (e.g. memory management, input integrity, access controls, stored procedures etc) will be left with a fundamental weakness in their web code and scripts.

*An escape character is a single character designated to invoke an alternative interpretation on immediately subsequent characters in a character sequence


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts