This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Testing for Oracle"
(→Gray Box testing and example) |
(→Gray Box testing and example) |
||
Line 25: | Line 25: | ||
'''Testing for Authentication credential management:'''<br> | '''Testing for Authentication credential management:'''<br> | ||
* Unlimited failed login attempts<br> | * Unlimited failed login attempts<br> | ||
+ | |||
+ | Check the FAILED_LOGIN_ATTEMPTS parameter: | ||
+ | |||
+ | The FAILED_LOGIN_ATTEMPTS parameter is used to limit to the number of failed login attempts allowed before a user account is locked by the data base.<BR> | ||
+ | |||
+ | FAILED_LOGIN_ATTEMPTS can be set to a specific number of attempts; to UNLIMITED (never lock an account), to DEFAULT, which refers to the value indicated in the DEFAULT profile.<BR> | ||
+ | |||
+ | Setting this value reduces the potential success of a brute force attack and alerts. Once an account is locked it can not be logged into for a defined number of days or until the administrator unlocks the account.<BR> | ||
+ | <BR> | ||
* Password Expiry | * Password Expiry | ||
* Password reuse | * Password reuse |
Revision as of 11:53, 28 November 2006
[Up]
OWASP Testing Guide v2 Table of Contents
Brief Summary
Testing an Oracle database server can be very beneficial to the security of the application. It is common that the database port (E.g. 1521) is protected by the firewall but can be accessible on the internal LAN. If the Oracle database is not hardened internal "insider attacks" may occur.
Description of the Issue
...here: Short Description of the Issue: Topic and Explanation
Black Box testing and example
Testing for Weak Account Passwords:
...
Result Expected:
...
Testing for Communication infrastructure & Availability:
...
Result Expected:
...
Gray Box testing and example
Testing for Authentication credential management:
- Unlimited failed login attempts
Check the FAILED_LOGIN_ATTEMPTS parameter:
The FAILED_LOGIN_ATTEMPTS parameter is used to limit to the number of failed login attempts allowed before a user account is locked by the data base.
FAILED_LOGIN_ATTEMPTS can be set to a specific number of attempts; to UNLIMITED (never lock an account), to DEFAULT, which refers to the value indicated in the DEFAULT profile.
Setting this value reduces the potential success of a brute force attack and alerts. Once an account is locked it can not be logged into for a defined number of days or until the administrator unlocks the account.
- Password Expiry
- Password reuse
- Unencrypted Database Link Password
- Default Roles
- PUBLIC Object Permissions
- UTL Package Permissions
- Default Tablespace
Result Expected:
...
References
Whitepapers
...
Tools
...
OWASP Testing Guide v2
Here is the OWASP Testing Guide v2 Table of Contents