Several potential threats against SQL Server passwords

Source: Internet
Author: User
Tags microsoft baseline security analyzer

This article provides six potential threats to SQL Server passwords. We hope that they will attract your attention ......
No plan for password Testing

It would be a big mistake to try to crack the password directly during the test. Whether you are testing locally or over the Internet, I strongly recommend that you obtain permissions and recommend a rollback solution after your account is locked. The last thing you need to do is to ensure that database users cannot perform operations when the account is locked, and the applications connected to the database cannot run normally.

The password is still secure over the Internet

For SQL Server implemented in hybrid mode, you can easily get its password from the Internet through some analysis software (such as OmniPeek and Ethereal. At the same time, Cain and Abel can be used to capture the TDS-based password. Do you think you can avoid this problem through an intranet switch? However, the ARP poisoning routing function of Cain can easily crack it. In about one minute, this free software can break your switch and view the internal data exchange in the local network to help other software easily capture passwords.

In fact, the problem has not ended. Some Misunderstandings hold that it is safe to use Windows Authentication in SQL Server. However, this is not the case. The above software can also quickly capture Windows, Web, email and other related passwords from the Internet, so as to obtain the access permissions of SQL Server.

By using the password policy, we don't need to test the password, no matter how strict your password policy is, there will always be some way to bypass it. For example, an unconfigured Server, a host outside Windows, an unknown SQL Server, or some special tools can crack the strongest passwords. These things can exploit the weakness of your password and make your code policy ineffective.

In addition, it is equally important that some test results may say that your database is safe because your password is strong, but you must never trust it. Be sure to test and verify whether the password defect is still there. Although you may think everything is good, you may actually get rid of something.

Since the SQL Server password cannot be retained, if I know that it is strong and safe, why should I crack it?

In fact, the SQL Server password can be re-obtained. In SQL Server 7 and SQL Server 2000, you can use tools like Cain and Abel or charged NGSSQLCrack to obtain the password hash table, and then use brute force attacks to crack it. These tools allow you to reverse engineer the SQL Server password SHA hash table. Although the results of the cracking cannot be guaranteed, it is indeed a weakness of SQL Server.

I have used MBSA to check SQL Server password defects and have not found any serious problems.

Microsoft Baseline Security Analyzer is a tool used to eradicate SQL Server Vulnerabilities, but it is not perfect, especially in password cracking. For deep SQL Server and Windows password cracking, we need to use third-party software, such as free SQLat and SQLninja (which can be found in SQLPing 3) and Windows password cracking tools, for example, ElcomSofts Proactive Password Auditor and Ophcrack.

In addition, using Windows Authentication in SQL Server does not mean that your password is secure. Some people only need to know how to crack the Windows Password and take some time to crack your password and control the entire network. In particular, if they use <> Ophcracks LiveCD to attack a physically insecure Windows host, such as a laptop or an accessible server, it will become easier.

Just worry about your primary database server

We can easily focus on our own SQL Server System, ignoring the possible MSDE, SQL Serve Express, and other possible SQL Server programs in the network. These systems may be using insecure default settings, or even have no password at all. By using tools such as SQLPing 3 to attack these systems on the database server, you will be easily cracked.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.