Exploiting NoSQL Like Never Before

Researcher,Programmer @ Opensec,Speaker at Opensec
May. 21, 2015
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
Exploiting NoSQL Like Never Before
1 of 90

More Related Content

What's hot

Secure360 - Extracting Password from WindowsSecure360 - Extracting Password from Windows
Secure360 - Extracting Password from WindowsScott Sutherland
Understanding the Solr Security Framekwork: Presented by Anshum Gupta, IBMUnderstanding the Solr Security Framekwork: Presented by Anshum Gupta, IBM
Understanding the Solr Security Framekwork: Presented by Anshum Gupta, IBMLucidworks
Attack All the Layers: What's Working during Pentests (OWASP NYC)Attack All the Layers: What's Working during Pentests (OWASP NYC)
Attack All the Layers: What's Working during Pentests (OWASP NYC)Scott Sutherland
Injection flaw teaserInjection flaw teaser
Injection flaw teaserNotSoSecure Global Services
Anatomy of a Cloud HackAnatomy of a Cloud Hack
Anatomy of a Cloud HackNotSoSecure Global Services
Python & Cassandra - Best FriendsPython & Cassandra - Best Friends
Python & Cassandra - Best FriendsJon Haddad

What's hot(20)

Similar to Exploiting NoSQL Like Never Before

Experience sql server on l inux and dockerExperience sql server on l inux and docker
Experience sql server on l inux and dockerBob Ward
Brk2051 sql server on linux and dockerBrk2051 sql server on linux and docker
Brk2051 sql server on linux and dockerBob Ward
Why ruby and railsWhy ruby and rails
Why ruby and railsReuven Lerner
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
SQL on linuxSQL on linux
SQL on linuxMaximiliano Accotto
CISSP Prep: Ch 9. Software Development SecurityCISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecuritySam Bowne

Recently uploaded

Hacktober Fest 2023 SessionHacktober Fest 2023 Session
Hacktober Fest 2023 SessionAdnan Sheikh
i3.pdfi3.pdf
i3.pdfssusere51484
Second messenger.pptxSecond messenger.pptx
Second messenger.pptxLaraibzafar15
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdfCS Knowledge
DSL - EDM OFFER - DUNK.pptxDSL - EDM OFFER - DUNK.pptx
DSL - EDM OFFER - DUNK.pptxMarcLewis35
AusNOG 2023: RPKI and whois updatesAusNOG 2023: RPKI and whois updates
AusNOG 2023: RPKI and whois updatesAPNIC

Exploiting NoSQL Like Never Before

Editor's Notes

  1. Opensecurity a community of like minded people for security,organizes yearly conference’s on information and security.
  2. Schema less means No schema required: Data can be inserted in a NoSQL database without first defining a rigid database schema. As a corollary, the format of the data being inserted can be changed at any time, without application disruption. This provides immense application flexibility, which ultimately delivers substantial business flexibility.
  3. Low on Security Discuss various encryption issues
  4. MongoDB wire Protocol is a simple socket-based, request-response style protocol. Clients communicate with the database server through a regular TCP/IP socket.
  5. Since Mongo uses Javascript ,there has been lately a lot of abuse (it uses the V8 engine for version greater than 2.4 before used Spider Monkey) RCE for mongo 2.2 is already an metasploit module. Locked js environment but possibility to overwrite certain prototypes Resource exhaustion
  6. db.killOp(opid) kills the current operation in the db db.listCommands() lists all the db commands db.loadServerScripts() loads all the scripts in db.system.js run a database command. if cmdObj is a string, turns it into { cmdObj : 1 }
  7. Rather than writing several js functions needed Attacker can save harmful scripts and call eval to evaluate the scripts db.loadServerScripts() loads script from the system.js collectionn
  8. Db is database object in mongo shell
  9. $where evaluates a js code ,if it returns one then it then it returns true .
  10. Write new vectors exists, checks for whether document $exists Matches documents that have the specified field. $type Selects documents if a field is of the specified type.if char then return all documents with char $all Matches arrays that contain all elements specified in the query.
  11. XSPA attacks in Replication (limited to port web server ports) File enumeration
  12. Ports that have web i
  13. _all_dbs,_changes
  14. _design api call is used to fetch the documents And the _queryAndTest is used to give the request directly via Curl
  15. Documentation allows attackers to specifically target redis,
  16. Used to list available scripts,kill available scripts
  17. Consider a case scenario where we have an webapp running on apache server By rewriting the location to
  18. Php app is broken somewhat (I had a demo for it )