Description: Slides - http://defcon.org/images/defcon-18/dc-18-presentations/Alonso-Palazon/DEFCON-18-Alonso-Palazon-String.pdf
White Paper - http://defcon.org/images/defcon-18/dc-18-presentations/Alonso-Palazon/DEFCON-18-Alonso-Palazon-String-wp.pdf
This session is about Parameter Pollution in Connection Strings Attack. Today, a lot of tools and web applications allow users to configure dynamically a connection against a Database server. This session will demonstrate the high risk in doing this insecurely. This session will show how to steal, in Microsoft Internet Information Services, the user account credential, how to get access to this web applications impersonating the connection and taking advance of the web server credentials and how to connect against internal databases servers in the DMZ without credentials. The impact of these techniques are especially dangerous in hosting companies which allow customers to connect against control panels to configure databases.
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.