SlideShare a Scribd company logo
Cruel (SQL) Intentions - An analysis of
malicious intentions behind real world SQL
injection attacks
Ezra Caltum – Sr. Security Researcher Akamai
Mysql> SELECT title FROM talk;
Mysql> SELECT author FROM talk;
• The Platform
• 167,000+ Servers
• 2,300+ Locations
• 750+ Cities
• 92 Countries
• 1,227+ Networks
• The Data
• 2 trillion hits per day
• 780 million unique IPv4
addresses seen
quarterly
• 13+ trillion log lines per
day
• 260+ terabytes of
compressed daily logs
15 - 30% of all web traffic
Mysql> SELECT COUNT(DISTINCT
days) FROM research_data;
+-------+
| days |
+-------+
| 7 |
+-------+
Mysql> SELECT COUNT(DISTINCT
apps) FROM research_data;
+-------+
| apps |
+-------+
| 2000 |
+-------+
Mysql> SELECT COUNT(DISTINCT
injections) FROM
research_data;
+--------------+
| injections |
+--------------+
| 8,425,489 |
+--------------+
Mysql> SELECT COUNT(DISTINCT injections) as
injections, COUNT(DISTINCT injections)/8425489 as
percentage FROM research_data WHERE category =
'SQL INJECTION PROBING AND INJECTION
TESTING';
+------------+-----------------------+
|injections | percentage |
+------------+-----------------------+
| 5,021,240 | 59.59% |
+------------+-----------------------+
Mysql> SELECT COUNT(DISTINCT injections) as
injections, COUNT(DISTINCT injections)/8425489 as
percentage, COUNT(DISTINCT injections)/3406249 as
norm_perc FROM research_data WHERE category =
'ENVIROMENT PROBING AND TESTING';
+------------+-----------------------+
| injections | percentage | norm_perc|
+------------+-----------------------+
| 1,308,681 | 15.5% | 38.42% |
+------------+------------+----------+
Mysql> SELECT COUNT(DISTINCT injections) as
injections, COUNT(DISTINCT injections)/8425489 as
percentage, COUNT(DISTINCT injections)/3406249 as
norm_perc FROM research_data WHERE category =
'DATABASE CONTENT RETRIEVAL';
+------------+-----------------------+
| injections | percentage | norm_perc|
+------------+-----------------------+
| 129,814 | 1.5403% | 3.811054%|
+------------+-----------------------+
Mysql> SELECT COUNT(DISTINCT injections) as
injections, COUNT(DISTINCT injections)/8425489 as
percentage, COUNT(DISTINCT injections)/3406249 as
norm_perc FROM research_data WHERE category =
'CREDENTIAL THEFT';
+------------+-----------------------+
| injections | percentage | norm_perc|
+------------+-----------------------+
| 1,950,749 | 23.14745% |57.269712%|
+------------+-----------------------+
Mysql> SELECT COUNT(DISTINCT injections) as
injections, COUNT(DISTINCT injections)/8425489 as
percentage, COUNT(DISTINCT injections)/3406249 as
norm_perc FROM research_data WHERE category =
'LOGIN BYPASS';
+------------+-----------------------+
| injections | percentage | norm_perc|
+------------+-----------------------+
| 5,467 | 00.064871%|00.160499%|
+------------+-----------------------+
Mysql> SELECT COUNT(DISTINCT injections) as
injections, COUNT(DISTINCT injections)/8425489 as
percentage, COUNT(DISTINCT injections)/3406249 as
norm_perc FROM research_data WHERE category =
'DATA FILE EXTRACTION';
+------------+-----------------------+
| injections | percentage | norm_perc|
+------------+-----------------------+
| 24 | 0.00028% |0.0007% |
+------------+-----------------------+
Mysql> SELECT COUNT(DISTINCT injections) as
injections, COUNT(DISTINCT injections)/8425489 as
percentage, COUNT(DISTINCT injections)/3406249 as
norm_perc FROM research_data WHERE category =
'DENIAL OF SERVICE';
+------------+-----------------------+
| injections | percentage | norm_perc|
+------------+-----------------------+
| 326 | 0.00387% | 0.009571%|
+------------+-----------------------+
Mysql> SELECT COUNT(DISTINCT injections) as injections,
COUNT(DISTINCT injections)/8425489 as percentage,
COUNT(DISTINCT injections)/3406249 as norm_perc FROM
research_data WHERE category =
'DATA CORRUPTION';
+------------+-----------------------+
| injections | percentage | norm_perc|
+------------+-----------------------+
| 2,238 | 0.026556% | 0.065702%|
+------------+-----------------------+
Mysql> SELECT COUNT(DISTINCT injections) as
injections, COUNT(DISTINCT injections)/8425489 as
percentage, COUNT(DISTINCT injections)/3406249 as
norm_perc FROM research_data WHERE category =
'DEFACEMENT AND CONTENT INJECTION';
+------------+-----------------------+
| injections | percentage | norm_perc|
+------------+-----------------------+
|8,156 | 0.096778% |0.239442% |
+------------+-----------------------+
Mysql> SELECT COUNT(DISTINCT injections) as
injections, COUNT(DISTINCT injections)/8425489 as
percentage, COUNT(DISTINCT injections)/3406249 as
norm_perc FROM research_data WHERE category =
'RCE';
+------------+-----------------------+
| injections | percentage | norm_perc|
+------------+-----------------------+
| 794 | 0.00942% | 0.023310%|
+------------+-----------------------+
Mysql> SELECT summary FROM talk
+------------+-----------------------+
| summary
+------------+-----------------------+
|Malicious actors use a variety of |
|of techniques. |
|Not only data exfiltration, but: |
|Elevate privileges, execute commands,|
|infect or corrupt data, deny service |
+------------+-----------------------+
DROP /**/ TABLE talk;
Twitter: @aCaltum
http://ezra.c.com.mx
http://www.stateoftheinternet.com
SELECT questions FROM
attendees WHERE (used_time
+ question_time) <= 15;

More Related Content

Viewers also liked

Basic learning theories
Basic learning  theoriesBasic learning  theories
Basic learning theories
mordecao
 
ViSeQR: Etichette come impronte digitali
ViSeQR: Etichette come impronte digitaliViSeQR: Etichette come impronte digitali
ViSeQR: Etichette come impronte digitali
CREAF Srl Prato (Italy)
 
Examples of Required Documents
Examples of Required DocumentsExamples of Required Documents
Examples of Required Documents
Jaron Denson
 
ใบงานที่ 1 แบบสำรวจตนเอง
ใบงานที่ 1 แบบสำรวจตนเองใบงานที่ 1 แบบสำรวจตนเอง
ใบงานที่ 1 แบบสำรวจตนเอง
Sadanan Kuhamaneerat
 
100 preguntas-sobre-sexualidad-adolescente
100 preguntas-sobre-sexualidad-adolescente100 preguntas-sobre-sexualidad-adolescente
100 preguntas-sobre-sexualidad-adolescente
Consuelo A. Rehbein Caerols
 
Lean Innovation: l’opportunità concreta di dare nuovo valore all’impresa
Lean Innovation: l’opportunità concreta di dare nuovo valore all’impresa Lean Innovation: l’opportunità concreta di dare nuovo valore all’impresa
Lean Innovation: l’opportunità concreta di dare nuovo valore all’impresa
CREAF Srl Prato (Italy)
 
Transformative learning
Transformative learningTransformative learning
Transformative learning
Suayni Biggs
 
Trespass to the person
Trespass to the personTrespass to the person
Trespass to the person
Suayni Biggs
 
Nuisance
NuisanceNuisance
Nuisance
Suayni Biggs
 
Minuta leyes secretas - Consejo Transparencia
Minuta leyes secretas - Consejo Transparencia Minuta leyes secretas - Consejo Transparencia
Minuta leyes secretas - Consejo Transparencia
Consuelo A. Rehbein Caerols
 

Viewers also liked (13)

Basic learning theories
Basic learning  theoriesBasic learning  theories
Basic learning theories
 
ViSeQR: Etichette come impronte digitali
ViSeQR: Etichette come impronte digitaliViSeQR: Etichette come impronte digitali
ViSeQR: Etichette come impronte digitali
 
Examples of Required Documents
Examples of Required DocumentsExamples of Required Documents
Examples of Required Documents
 
profile new
profile newprofile new
profile new
 
ใบงานที่ 1 แบบสำรวจตนเอง
ใบงานที่ 1 แบบสำรวจตนเองใบงานที่ 1 แบบสำรวจตนเอง
ใบงานที่ 1 แบบสำรวจตนเอง
 
Wordsmith essay editors
Wordsmith essay editorsWordsmith essay editors
Wordsmith essay editors
 
Mithun Khatei
Mithun KhateiMithun Khatei
Mithun Khatei
 
100 preguntas-sobre-sexualidad-adolescente
100 preguntas-sobre-sexualidad-adolescente100 preguntas-sobre-sexualidad-adolescente
100 preguntas-sobre-sexualidad-adolescente
 
Lean Innovation: l’opportunità concreta di dare nuovo valore all’impresa
Lean Innovation: l’opportunità concreta di dare nuovo valore all’impresa Lean Innovation: l’opportunità concreta di dare nuovo valore all’impresa
Lean Innovation: l’opportunità concreta di dare nuovo valore all’impresa
 
Transformative learning
Transformative learningTransformative learning
Transformative learning
 
Trespass to the person
Trespass to the personTrespass to the person
Trespass to the person
 
Nuisance
NuisanceNuisance
Nuisance
 
Minuta leyes secretas - Consejo Transparencia
Minuta leyes secretas - Consejo Transparencia Minuta leyes secretas - Consejo Transparencia
Minuta leyes secretas - Consejo Transparencia
 

Similar to Cruel (SQL) Intentions

Advance MySQL Training by Pratyush Majumdar
Advance MySQL Training by Pratyush MajumdarAdvance MySQL Training by Pratyush Majumdar
Advance MySQL Training by Pratyush Majumdar
Pratyush Majumdar
 
Writing efficient sql
Writing efficient sqlWriting efficient sql
Writing efficient sqlj9soto
 
M|18 Querying Data at a Previous Point in Time
M|18 Querying Data at a Previous Point in TimeM|18 Querying Data at a Previous Point in Time
M|18 Querying Data at a Previous Point in Time
MariaDB plc
 
Streaming ETL - from RDBMS to Dashboard with KSQL
Streaming ETL - from RDBMS to Dashboard with KSQLStreaming ETL - from RDBMS to Dashboard with KSQL
Streaming ETL - from RDBMS to Dashboard with KSQL
Bjoern Rost
 
Performance Schema for MySQL Troubleshooting
Performance Schema for MySQL TroubleshootingPerformance Schema for MySQL Troubleshooting
Performance Schema for MySQL Troubleshooting
Sveta Smirnova
 
Using Optimizer Hints to Improve MySQL Query Performance
Using Optimizer Hints to Improve MySQL Query PerformanceUsing Optimizer Hints to Improve MySQL Query Performance
Using Optimizer Hints to Improve MySQL Query Performance
oysteing
 
5 Cool Things About SQL
5 Cool Things About SQL5 Cool Things About SQL
5 Cool Things About SQL
Connor McDonald
 
MySQL Kitchen : spice up your everyday SQL queries
MySQL Kitchen : spice up your everyday SQL queriesMySQL Kitchen : spice up your everyday SQL queries
MySQL Kitchen : spice up your everyday SQL queries
Damien Seguy
 
My sql 5.7-upcoming-changes-v2
My sql 5.7-upcoming-changes-v2My sql 5.7-upcoming-changes-v2
My sql 5.7-upcoming-changes-v2Morgan Tocker
 
Applied Partitioning And Scaling Your Database System Presentation
Applied Partitioning And Scaling Your Database System PresentationApplied Partitioning And Scaling Your Database System Presentation
Applied Partitioning And Scaling Your Database System PresentationRichard Crowley
 
Dun ddd
Dun dddDun ddd
Beyond php - it's not (just) about the code
Beyond php - it's not (just) about the codeBeyond php - it's not (just) about the code
Beyond php - it's not (just) about the code
Wim Godden
 
A few things about the Oracle optimizer - 2013
A few things about the Oracle optimizer - 2013A few things about the Oracle optimizer - 2013
A few things about the Oracle optimizer - 2013
Connor McDonald
 
New index features in MySQL 8
New index features in MySQL 8New index features in MySQL 8
New index features in MySQL 8
Erik Frøseth
 
Checking clustering factor to detect row migration
Checking clustering factor to detect row migrationChecking clustering factor to detect row migration
Checking clustering factor to detect row migration
Heribertus Bramundito
 
Performance schema and sys schema
Performance schema and sys schemaPerformance schema and sys schema
Performance schema and sys schema
Mark Leith
 
Oracle dbms_xplan.display_cursor format
Oracle dbms_xplan.display_cursor formatOracle dbms_xplan.display_cursor format
Oracle dbms_xplan.display_cursor format
Franck Pachot
 
Fulltext engine for non fulltext searches
Fulltext engine for non fulltext searchesFulltext engine for non fulltext searches
Fulltext engine for non fulltext searches
Adrian Nuta
 
16 MySQL Optimization #burningkeyboards
16 MySQL Optimization #burningkeyboards16 MySQL Optimization #burningkeyboards
16 MySQL Optimization #burningkeyboards
Denis Ristic
 
4. Data Manipulation.ppt
4. Data Manipulation.ppt4. Data Manipulation.ppt
4. Data Manipulation.ppt
KISHOYIANKISH
 

Similar to Cruel (SQL) Intentions (20)

Advance MySQL Training by Pratyush Majumdar
Advance MySQL Training by Pratyush MajumdarAdvance MySQL Training by Pratyush Majumdar
Advance MySQL Training by Pratyush Majumdar
 
Writing efficient sql
Writing efficient sqlWriting efficient sql
Writing efficient sql
 
M|18 Querying Data at a Previous Point in Time
M|18 Querying Data at a Previous Point in TimeM|18 Querying Data at a Previous Point in Time
M|18 Querying Data at a Previous Point in Time
 
Streaming ETL - from RDBMS to Dashboard with KSQL
Streaming ETL - from RDBMS to Dashboard with KSQLStreaming ETL - from RDBMS to Dashboard with KSQL
Streaming ETL - from RDBMS to Dashboard with KSQL
 
Performance Schema for MySQL Troubleshooting
Performance Schema for MySQL TroubleshootingPerformance Schema for MySQL Troubleshooting
Performance Schema for MySQL Troubleshooting
 
Using Optimizer Hints to Improve MySQL Query Performance
Using Optimizer Hints to Improve MySQL Query PerformanceUsing Optimizer Hints to Improve MySQL Query Performance
Using Optimizer Hints to Improve MySQL Query Performance
 
5 Cool Things About SQL
5 Cool Things About SQL5 Cool Things About SQL
5 Cool Things About SQL
 
MySQL Kitchen : spice up your everyday SQL queries
MySQL Kitchen : spice up your everyday SQL queriesMySQL Kitchen : spice up your everyday SQL queries
MySQL Kitchen : spice up your everyday SQL queries
 
My sql 5.7-upcoming-changes-v2
My sql 5.7-upcoming-changes-v2My sql 5.7-upcoming-changes-v2
My sql 5.7-upcoming-changes-v2
 
Applied Partitioning And Scaling Your Database System Presentation
Applied Partitioning And Scaling Your Database System PresentationApplied Partitioning And Scaling Your Database System Presentation
Applied Partitioning And Scaling Your Database System Presentation
 
Dun ddd
Dun dddDun ddd
Dun ddd
 
Beyond php - it's not (just) about the code
Beyond php - it's not (just) about the codeBeyond php - it's not (just) about the code
Beyond php - it's not (just) about the code
 
A few things about the Oracle optimizer - 2013
A few things about the Oracle optimizer - 2013A few things about the Oracle optimizer - 2013
A few things about the Oracle optimizer - 2013
 
New index features in MySQL 8
New index features in MySQL 8New index features in MySQL 8
New index features in MySQL 8
 
Checking clustering factor to detect row migration
Checking clustering factor to detect row migrationChecking clustering factor to detect row migration
Checking clustering factor to detect row migration
 
Performance schema and sys schema
Performance schema and sys schemaPerformance schema and sys schema
Performance schema and sys schema
 
Oracle dbms_xplan.display_cursor format
Oracle dbms_xplan.display_cursor formatOracle dbms_xplan.display_cursor format
Oracle dbms_xplan.display_cursor format
 
Fulltext engine for non fulltext searches
Fulltext engine for non fulltext searchesFulltext engine for non fulltext searches
Fulltext engine for non fulltext searches
 
16 MySQL Optimization #burningkeyboards
16 MySQL Optimization #burningkeyboards16 MySQL Optimization #burningkeyboards
16 MySQL Optimization #burningkeyboards
 
4. Data Manipulation.ppt
4. Data Manipulation.ppt4. Data Manipulation.ppt
4. Data Manipulation.ppt
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Cruel (SQL) Intentions

  • 1. Cruel (SQL) Intentions - An analysis of malicious intentions behind real world SQL injection attacks Ezra Caltum – Sr. Security Researcher Akamai Mysql> SELECT title FROM talk; Mysql> SELECT author FROM talk;
  • 2. • The Platform • 167,000+ Servers • 2,300+ Locations • 750+ Cities • 92 Countries • 1,227+ Networks • The Data • 2 trillion hits per day • 780 million unique IPv4 addresses seen quarterly • 13+ trillion log lines per day • 260+ terabytes of compressed daily logs 15 - 30% of all web traffic
  • 3. Mysql> SELECT COUNT(DISTINCT days) FROM research_data; +-------+ | days | +-------+ | 7 | +-------+
  • 4. Mysql> SELECT COUNT(DISTINCT apps) FROM research_data; +-------+ | apps | +-------+ | 2000 | +-------+
  • 5. Mysql> SELECT COUNT(DISTINCT injections) FROM research_data; +--------------+ | injections | +--------------+ | 8,425,489 | +--------------+
  • 6. Mysql> SELECT COUNT(DISTINCT injections) as injections, COUNT(DISTINCT injections)/8425489 as percentage FROM research_data WHERE category = 'SQL INJECTION PROBING AND INJECTION TESTING'; +------------+-----------------------+ |injections | percentage | +------------+-----------------------+ | 5,021,240 | 59.59% | +------------+-----------------------+
  • 7. Mysql> SELECT COUNT(DISTINCT injections) as injections, COUNT(DISTINCT injections)/8425489 as percentage, COUNT(DISTINCT injections)/3406249 as norm_perc FROM research_data WHERE category = 'ENVIROMENT PROBING AND TESTING'; +------------+-----------------------+ | injections | percentage | norm_perc| +------------+-----------------------+ | 1,308,681 | 15.5% | 38.42% | +------------+------------+----------+
  • 8. Mysql> SELECT COUNT(DISTINCT injections) as injections, COUNT(DISTINCT injections)/8425489 as percentage, COUNT(DISTINCT injections)/3406249 as norm_perc FROM research_data WHERE category = 'DATABASE CONTENT RETRIEVAL'; +------------+-----------------------+ | injections | percentage | norm_perc| +------------+-----------------------+ | 129,814 | 1.5403% | 3.811054%| +------------+-----------------------+
  • 9. Mysql> SELECT COUNT(DISTINCT injections) as injections, COUNT(DISTINCT injections)/8425489 as percentage, COUNT(DISTINCT injections)/3406249 as norm_perc FROM research_data WHERE category = 'CREDENTIAL THEFT'; +------------+-----------------------+ | injections | percentage | norm_perc| +------------+-----------------------+ | 1,950,749 | 23.14745% |57.269712%| +------------+-----------------------+
  • 10. Mysql> SELECT COUNT(DISTINCT injections) as injections, COUNT(DISTINCT injections)/8425489 as percentage, COUNT(DISTINCT injections)/3406249 as norm_perc FROM research_data WHERE category = 'LOGIN BYPASS'; +------------+-----------------------+ | injections | percentage | norm_perc| +------------+-----------------------+ | 5,467 | 00.064871%|00.160499%| +------------+-----------------------+
  • 11. Mysql> SELECT COUNT(DISTINCT injections) as injections, COUNT(DISTINCT injections)/8425489 as percentage, COUNT(DISTINCT injections)/3406249 as norm_perc FROM research_data WHERE category = 'DATA FILE EXTRACTION'; +------------+-----------------------+ | injections | percentage | norm_perc| +------------+-----------------------+ | 24 | 0.00028% |0.0007% | +------------+-----------------------+
  • 12. Mysql> SELECT COUNT(DISTINCT injections) as injections, COUNT(DISTINCT injections)/8425489 as percentage, COUNT(DISTINCT injections)/3406249 as norm_perc FROM research_data WHERE category = 'DENIAL OF SERVICE'; +------------+-----------------------+ | injections | percentage | norm_perc| +------------+-----------------------+ | 326 | 0.00387% | 0.009571%| +------------+-----------------------+
  • 13. Mysql> SELECT COUNT(DISTINCT injections) as injections, COUNT(DISTINCT injections)/8425489 as percentage, COUNT(DISTINCT injections)/3406249 as norm_perc FROM research_data WHERE category = 'DATA CORRUPTION'; +------------+-----------------------+ | injections | percentage | norm_perc| +------------+-----------------------+ | 2,238 | 0.026556% | 0.065702%| +------------+-----------------------+
  • 14. Mysql> SELECT COUNT(DISTINCT injections) as injections, COUNT(DISTINCT injections)/8425489 as percentage, COUNT(DISTINCT injections)/3406249 as norm_perc FROM research_data WHERE category = 'DEFACEMENT AND CONTENT INJECTION'; +------------+-----------------------+ | injections | percentage | norm_perc| +------------+-----------------------+ |8,156 | 0.096778% |0.239442% | +------------+-----------------------+
  • 15. Mysql> SELECT COUNT(DISTINCT injections) as injections, COUNT(DISTINCT injections)/8425489 as percentage, COUNT(DISTINCT injections)/3406249 as norm_perc FROM research_data WHERE category = 'RCE'; +------------+-----------------------+ | injections | percentage | norm_perc| +------------+-----------------------+ | 794 | 0.00942% | 0.023310%| +------------+-----------------------+
  • 16. Mysql> SELECT summary FROM talk +------------+-----------------------+ | summary +------------+-----------------------+ |Malicious actors use a variety of | |of techniques. | |Not only data exfiltration, but: | |Elevate privileges, execute commands,| |infect or corrupt data, deny service | +------------+-----------------------+
  • 17. DROP /**/ TABLE talk; Twitter: @aCaltum http://ezra.c.com.mx http://www.stateoftheinternet.com
  • 18. SELECT questions FROM attendees WHERE (used_time + question_time) <= 15;