Arup:

BBED is

B lock
B rowser &
ED itor.


Best Regards,
K Gopalakrishnan




-----Original Message-----
Sent: Tuesday, November 26, 2002 6:24 PM
To: Multiple recipients of list ORACLE-L


What is BBED? I never heard of it.






>From: "K Gopalakrishnan" <[EMAIL PROTECTED]>
>Reply-To: [EMAIL PROTECTED]
>To: Multiple recipients of list ORACLE-L <[EMAIL PROTECTED]>
>Subject: RE: Oracle OS level security
>Date: Tue, 26 Nov 2002 16:09:27 -0800
>MIME-Version: 1.0
>Received: from newsfeed.cts.com ([209.68.248.164]) by
>mc8-f17.law1.hotmail.com with Microsoft SMTPSVC(5.0.2195.5600); Tue, 26 Nov
>2002 17:06:39 -0800
>Received: from fatcity.UUCP (uucp@localhost)by newsfeed.cts.com
>(8.9.3/8.9.3) with UUCP id RAA43612;Tue, 26 Nov 2002 17:01:24 -0800 (PST)
>Received: by fatcity.com (26-Feb-2001/v1.0g-b72/bab) via UUCP id 0050CFBE;
>Tue, 26 Nov 2002 16:09:27 -0800
>Message-ID: <[EMAIL PROTECTED]>
>X-Comment: Oracle RDBMS Community Forum
>X-Sender: "K Gopalakrishnan" <[EMAIL PROTECTED]>
>Sender: [EMAIL PROTECTED]
>Errors-To: [EMAIL PROTECTED]
>Organization: Fat City Network Services, San Diego, California
>X-ListServer: v1.0g, build 72; ListGuru (c) 1996-2001 Bruce A. Bergman
>Precedence: bulk
>Return-Path: [EMAIL PROTECTED]
>X-OriginalArrivalTime: 27 Nov 2002 01:06:39.0079 (UTC)
>FILETIME=[3D590770:01C295B1]
>
>Jared:
>
>Any one with a reasonable knowledge of Oracle Data Storage
>Internals can use the Data block Editor (BBED) to update
>anything in your database without the knowledge of the
>RDBMS kernel auditing mechanisms.
>
>Agreed,BBED is protected by a password in Windoze ports
>and one need to explicitly make the executable in Unix
>ports. But the point here is the hacker can do anything
>using the BBEd and this can be done even while your
>database is up and running !!
>
>What is their take on this kind of attack(!)s?>
>
>
>Best Regards,
>K Gopalakrishnan
>
>
>
>
>-----Original Message-----
>[EMAIL PROTECTED]
>Sent: Tuesday, November 26, 2002 3:05 PM
>To: Multiple recipients of list ORACLE-L
>
>
>Dear list,
>
>Let me toss a hypothetical situation at you.
>
>Say some auditors looked at some of your primary systems,
>and concluded that they had no assurance that someone with
>admin access to the server had not changed financial information
>to benefit themselves, or to falsify financial records for the
>gain of the company.
>
>Not that they might have any proof that something like that
>had been done, but rather, just not proof that it had *not*
>been done.
>
>I've been pondering this for a bit, and it seems to me that if
>someone had good knowledge of both the OS and the
>database (Oracle), as well as having admin rights on the
>server, there are few things you can do to prevent such a person
>from changing data in the database, and completely
>covering his or her tracks.
>
>The platforms in question are Unix, Windows NT and
>Windows 2000.   I've limited it to those as most database
>systems use one of those, and besides, that's all I know.  :)
>
>Consider what steps you might take to audit unauthorized
>transactions performed by an admin.
>
>Oracle Auditing could be used, but someone with admin
>access to the server and database could easily alter the
>records created by system auditing.
>
>You could create an audit table, using a trigger to audit
>sensitive tables.  A materialized view on a remote database
>could be created on sensitive tables to remotely log all
>actions.
>
>In the case of the audit table, that could easily be disabled,
>and then re-enabled after the nefarious DML had completed.
>
>The materialized views might be more difficult to circumvent.
>
>If the remote end is using a dblink to the server employing a
>password that is *different* than that of it's own account at the
>remote server, it should be impossible for someone to completely
>cover the traces of transactions created to falsify data.
>
>The MV  Logs could be dropped, but without access to the MV's
>at the remote server, the MV's would have to be left in place.
>
>These could be used as a reference to look for unauthorized transactions
>in the primary server.  If this same admin has access to the remote
>server where the MV's are, then this can also be circumvented.
>
>There is also the logs created as when logging in as internal
>or sysdba. ( $ORACLE_HOME/rdms/audit/*.aud )
>
>These can simply be deleted.  Some system could be used to save
>these to a remote server, but it would have to run *very* frequently to
>be effective.
>
>Oracle password files could also be used. While this can prevent
>someone from logging in as SYS or SYSTEM while in place, all it
>takes is a change to init.ora, and a database bounce to fix that.
>
>Make your bogus data changes, change the init.ora back and
>bounce the database again.
>
>A somewhat clever person could set this up to automatically
>take place the next time the DB is bounced.
>
>The conclusion I have come to is that the only effective method
>that could be used to create an audit trail for such a scenario is
>to create Materialized Views on sensitive tables, and create them
>on a server that admins are guaranteed to not have access to.
>
>Of course, I may be missing something.  I'm not always one to
>catch all the details right off.  Input, comments, suggestions, far
>out ideas are all welcome.
>
>If you've read this far, thanks!
>
>Jared
>
>
>
>
>
>--
>Please see the official ORACLE-L FAQ: http://www.orafaq.com
>--
>Author:
>   INET: [EMAIL PROTECTED]
>
>Fat City Network Services    -- 858-538-5051 http://www.fatcity.com
>San Diego, California        -- Mailing list and web hosting services
>---------------------------------------------------------------------
>To REMOVE yourself from this mailing list, send an E-Mail message
>to: [EMAIL PROTECTED] (note EXACT spelling of 'ListGuru') and in
>the message BODY, include a line containing: UNSUB ORACLE-L
>(or the name of mailing list you want to be removed from).  You may
>also send the HELP command for other information (like subscribing).
>
>
>--
>Please see the official ORACLE-L FAQ: http://www.orafaq.com
>--
>Author: K Gopalakrishnan
>   INET: [EMAIL PROTECTED]
>
>Fat City Network Services    -- 858-538-5051 http://www.fatcity.com
>San Diego, California        -- Mailing list and web hosting services
>---------------------------------------------------------------------
>To REMOVE yourself from this mailing list, send an E-Mail message
>to: [EMAIL PROTECTED] (note EXACT spelling of 'ListGuru') and in
>the message BODY, include a line containing: UNSUB ORACLE-L
>(or the name of mailing list you want to be removed from).  You may
>also send the HELP command for other information (like subscribing).


_________________________________________________________________
The new MSN 8: smart spam protection and 2 months FREE*
http://join.msn.com/?page=features/junkmail

--
Please see the official ORACLE-L FAQ: http://www.orafaq.com
--
Author: Arup Nanda
  INET: [EMAIL PROTECTED]

Fat City Network Services    -- 858-538-5051 http://www.fatcity.com
San Diego, California        -- Mailing list and web hosting services
---------------------------------------------------------------------
To REMOVE yourself from this mailing list, send an E-Mail message
to: [EMAIL PROTECTED] (note EXACT spelling of 'ListGuru') and in
the message BODY, include a line containing: UNSUB ORACLE-L
(or the name of mailing list you want to be removed from).  You may
also send the HELP command for other information (like subscribing).


-- 
Please see the official ORACLE-L FAQ: http://www.orafaq.com
-- 
Author: K Gopalakrishnan
  INET: [EMAIL PROTECTED]

Fat City Network Services    -- 858-538-5051 http://www.fatcity.com
San Diego, California        -- Mailing list and web hosting services
---------------------------------------------------------------------
To REMOVE yourself from this mailing list, send an E-Mail message
to: [EMAIL PROTECTED] (note EXACT spelling of 'ListGuru') and in
the message BODY, include a line containing: UNSUB ORACLE-L
(or the name of mailing list you want to be removed from).  You may
also send the HELP command for other information (like subscribing).

Reply via email to