Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

PostgreSQL Pass­The­Hash protocol design weakness

$
0
0
The PostgreSQL Challenge­Response Authentication using the AUTH_REQ_MD5 method or
simply configuring "md5" as the Host Based Authentication (HBA) in pg_hba.conf is the
default setting on many linux distributions as well as recommended in the default
configuration on github:METHOD can be "trust", "reject", "md5", "password", "gss", "sspi", "ident", "peer", "pam", "ldap", "radius" or "cert". Note that "password" sends passwords in clear text; "md5" is preferred since it sends encrypted passwords. It has a severe protocol design weakness. The weakness we have found here, and that we can demonstrate with a proof of concept (POC) code, is also known as a pass­the­hash (PTH) vulnerability [1].

more here.........https://hashcat.net/misc/postgres-pth/postgres-pth.pdf


Proof of Concepts on the following links:
https://hashcat.net/misc/postgres-pth/postgresql_diff_clean.txt
https://hashcat.net/misc/postgres-pth/postgresql_diff_minimal.txt

Viewing all articles
Browse latest Browse all 8064

Trending Articles