Ruben Hubert, Anna Bánáti, L. Erdődi, Rita Fleiner
{"title":"通过抓旗演习加强数据库安全","authors":"Ruben Hubert, Anna Bánáti, L. Erdődi, Rita Fleiner","doi":"10.1109/INES56734.2022.9922636","DOIUrl":null,"url":null,"abstract":"Database security has a key role when protecting websites and other IT services. Attacks against databases could result in the leak of confidential data or integrity related security issues. One of the best options to protect services that utilize databases is to simulate real attacks against these. This paper focuses on capture the flag (CTF) style attack simulation and compare existing CTF challenges in the field of database security. The aim was to map the existing databases weaknesses and vulnerabilities into CTF style problems and help penetration testers to understand different attack scenarios against services with database connections. We identified several database related vulnerabilities that are usually not covered by CTF style challenges and a discussion is made how these missing fields could be added to the most well-known offensive security exercises.","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Strengthening Database Security with Capture the Flag Exercises\",\"authors\":\"Ruben Hubert, Anna Bánáti, L. Erdődi, Rita Fleiner\",\"doi\":\"10.1109/INES56734.2022.9922636\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Database security has a key role when protecting websites and other IT services. Attacks against databases could result in the leak of confidential data or integrity related security issues. One of the best options to protect services that utilize databases is to simulate real attacks against these. This paper focuses on capture the flag (CTF) style attack simulation and compare existing CTF challenges in the field of database security. The aim was to map the existing databases weaknesses and vulnerabilities into CTF style problems and help penetration testers to understand different attack scenarios against services with database connections. We identified several database related vulnerabilities that are usually not covered by CTF style challenges and a discussion is made how these missing fields could be added to the most well-known offensive security exercises.\",\"PeriodicalId\":253486,\"journal\":{\"name\":\"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INES56734.2022.9922636\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INES56734.2022.9922636","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Strengthening Database Security with Capture the Flag Exercises
Database security has a key role when protecting websites and other IT services. Attacks against databases could result in the leak of confidential data or integrity related security issues. One of the best options to protect services that utilize databases is to simulate real attacks against these. This paper focuses on capture the flag (CTF) style attack simulation and compare existing CTF challenges in the field of database security. The aim was to map the existing databases weaknesses and vulnerabilities into CTF style problems and help penetration testers to understand different attack scenarios against services with database connections. We identified several database related vulnerabilities that are usually not covered by CTF style challenges and a discussion is made how these missing fields could be added to the most well-known offensive security exercises.