36C3 - SELECT code_execution FROM * USING SQLite;

  Рет қаралды 6,795

media.ccc.de

media.ccc.de

Күн бұрын

media.ccc.de/v/36c3-10701-sel...
--Gaining code execution using a malicious SQLite database
SQLite is one of the most deployed software in the world. However, from a security perspective, it has only been examined through the narrow lens of WebSQL and browser exploitation. We believe that this is just the tip of the iceberg.
In our long term research, we experimented with the exploitation of memory corruption issues within SQLite without relying on any environment other than the SQL language. Using our innovative techniques of Query Hijacking and Query Oriented Programming, we proved it is possible to reliably exploit memory corruptions issues in the SQLite engine. We demonstrate these techniques a couple of real-world scenarios: pwning a password stealer backend server, and achieving iOS persistency with higher privileges.
Everyone knows that databases are the crown jewels from a hacker's point of view, but what if you could use a database as the hacking tool itself? We discovered that simply querying a malicious SQLite database - can lead to Remote Code Execution. We used undocumented SQLite3 behavior and memory corruption vulnerabilities to take advantage of the assumption that querying a database is safe.
How? We created a rogue SQLite database that exploits the software used to open it.Exploring only a few of the possibilities this presents we’ll pwn password stealer backends while they parse credentials files and achieve iOS persistency by replacing its Contacts database…
The landscape is endless (Hint: Did someone say Windows 10 0-day?). This is extremely terrifying since SQLite3 is now practically built-in to any modern system.
In our talk we also discuss the SQLite internals and our novel approach for abusing them. We had to invent our own ROP chain technique using nothing but SQL CREATE statements. We used JOIN statements for Heap Spray and SELECT subqueries for x64 pointer unpacking and arithmetics. It's a new world of using the familiar Structured Query Language for exploitation primitives,laying the foundations for a generic leverage of memory corruption issues in database engines.
OmerGull
fahrplan.events.ccc.de/congre...

Пікірлер
36C3 -  Open Source is Insufficient to Solve Trust Problems in Hardware
1:00:46
36C3 -  How to Break PDFs
58:43
media.ccc.de
Рет қаралды 33 М.
Vivaan  Tanya once again pranked Papa 🤣😇🤣
00:10
seema lamba
Рет қаралды 31 МЛН
HOW DID HE WIN? 😱
00:33
Topper Guild
Рет қаралды 18 МЛН
Did you believe it was real? #tiktok
00:25
Анастасия Тарасова
Рет қаралды 40 МЛН
100+ Linux Things you Need to Know
12:23
Fireship
Рет қаралды 87 М.
36C3 -  Boeing 737MAX: Automated Crashes
1:00:48
media.ccc.de
Рет қаралды 173 М.
36C3 -  Leaving legacy behind
52:12
media.ccc.de
Рет қаралды 27 М.
36C3 -  TrustZone-M(eh): Breaking ARMv8-M's security
57:22
media.ccc.de
Рет қаралды 12 М.
36C3 -  An ultrashort history of ultrafast imaging
1:00:13
media.ccc.de
Рет қаралды 4 М.
🚀  TDD, Where Did It All Go Wrong (Ian Cooper)
1:03:55
DevTernity Conference
Рет қаралды 552 М.
36C3 -  (Post-Quantum) Isogeny Cryptography
52:23
media.ccc.de
Рет қаралды 5 М.