Presented at
DEF CON 27 (2019),
Aug. 10, 2019, 2 p.m.
(45 minutes).
Everyone knows that databases are the crown jewels from a hacker's point of view, but what if you could use a database as the hacking tool itself? We discovered that simply querying a malicious SQLite database - can lead to Remote Code Execution. We used undocumented SQLite3 behavior and memory corruption vulnerabilities to take advantage of the assumption that querying a database is safe.
How? We created a rogue SQLite database that exploits the software used to open it.Exploring only a few of the possibilities this presents we'll pwn password stealer backends while they parse credentials files and achieve iOS persistency by replacing its Contacts database…
The landscape is endless (Hint: Did someone say Windows 10 0-day?). This is extremely terrifying since SQLite3 is now practically built-in to any modern system.
In our talk we also discuss the SQLite internals and our novel approach for abusing them. We had to invent our own ROP chain technique using nothing but SQL CREATE statements. We used JOIN statements for Heap Spray and SELECT subqueries for x64 pointer unpacking and arithmetics. It's a new world of using the familiar Structured Query Language for exploitation primitives,laying the foundations for a generic leverage of memory corruption issues in database engines.
Presenters:
-
Omer Gull
- Security Researcher at Check Point Software Technologies
Omer Gull is a vulnerability researcher in the Malware and Vulnerability Research group at Check Point Software Technologies.
Omer has a diverse background in security research, that includes web application penetration testing, RE and exploitation.
He loves Rum, Old School Hip-Hop and Memory Corruptions.
Twitter: @GullOmer
Links:
Similar Presentations: