|Oracle Cast RAW Exploit
|One of the security industry's big money makers is monitoring SQL statements that for unusual behavior or for access to specific tables.
To evade these security tools those in the business of breaking into databases evolve techniques for hiding the details of the requests they are making to the database.
Three of those techniques are the Base64, CAST TO RAW, and the NoSpaces exploits (links at page bottom).
Many of the more sophisticated security tools can now catch these three exploits but it is not hard to imagine numerous variations to evade existing capabilities. Be sure you learn, from the follow demos, how this works. Then do the same with the other two exploits. To secure your database you need to intentionally attempt these exploits as part of a sanctioned White Hat attack and see if your environment will alert you.
|This demo consists of three attempts to execute the same SQL statement. The first is the statement written as it might be by a legitimate developer that wants to write clear, concise, and self-documenting code.
The second performs the exact same action but attempts to evade a security tool's ability to audit and evaluate the intent.
The third example demonstrates why the second example works.
|The Oracle Database interprets the comment tags
You are just trying to do your job. Some people's "job" is to find ways to evade your security measures. Investing time to understand these techniques and how they work, will make you better at evaluating what will protect your data and your databases.