4.9 • 696 Ratings
🗓️ 5 June 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Monday, June 6th, 2016 edition of the Sandus Storm Center's Stormcast. |
| 0:08.0 | My name is Johannes Ulrich and the I'm recording from Baltimore, Maryland. |
| 0:13.0 | Tom Liston is back and with a great diary about a recent compromise of a MySQL honeypot. |
| 0:23.6 | The attacker in this case used somewhat similar techniques as we have seen in some write-ups |
| 0:30.6 | in the past that covered Unix-based MySQL honeypots, but in Tom's case, the honeypot was exposed to a Windows-specific exploit. |
| 0:43.3 | MySQL with no or weak passwords and having it exposed to the public internet is still common enough for attackers to scan for it. |
| 0:53.3 | Each day we see pretty consistent scans for |
| 0:57.0 | around 2,000 different source IP addresses that are looking for MySQL servers. |
| 1:05.0 | In Tom's case, the attacker used a number of different methods to gain persistent access to the system. |
| 1:12.6 | The attacker dropped various files to the system and also loaded MySQL extensions |
| 1:18.6 | to implement a MySQL command that will execute shell commands. |
| 1:23.6 | This is a technique we have seen used before against MySQL on Unix and of course it |
| 1:30.5 | works just as well on Windows. The root problem here of course is a weak configuration. It's not |
| 1:38.0 | really a MySQL specific problem and similar exploits can be expected against other databases that are exposed. |
| 1:46.4 | And actually, for example, a case of database like Postgres or such, you already have |
| 1:51.7 | execute commands, you don't actually have to implement the way it's sort of done with its |
| 1:57.2 | extension in MySQL. Aside from configuring strong passwords for authentication |
| 2:03.6 | and isolating your database server from the public internet, |
| 2:07.6 | the server should also run as a restricted user. |
| 2:12.6 | This will effectively break some of the exploits |
| 2:15.6 | that the attacker is attempting here. |
| 2:18.3 | Remember that even if you isolate your database server, there's still the possibility that someone first breaks into your network |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.