Help! There's a bash shell in my MySQL server!
Similar to the recent MySQL Trojan (https://www.percona.com/blog/2015/10/29/mysql-trojan-chikdos/) infections we'll take a look at the complete stack compromise. - Looking over a purposefully vulnerable web application - Information gathering - Attack persistence - Attack pivoting - Metasploit - Escalation attacks on MySQL - How "bad configuration" allows malicious UDF injection on MySQL - "popping" a shell on the MySQL system (which is only addressable from the application nodes)
Information Security Architect, Percona
David has been a Linux systems admin for around 14 years, and generally in different roles - development, network admin, support, DBA, and more. He is a Fedora user and a fan of puppet (not so much the hat - nor Bert & Ernie, however). As time allows, he contributes to the EPEL packages for Openstack. He has an interest in infosec, and so is generally paranoid about security. He is also familiar with metasploit, sqlmap, john, oclHashCat, and has also written a few python tools. Living in Whitchurch, United Kingdom, he holds a 2nd dan black belt in Ju-Jitsu and, with his Father and Uncle, helps to teach at a local non-profit club with ages ranging from 6+. He also teaches computing to students at a local school using the Raspberry Pi as the platform running Raspbian. He is proud that they're starting to grow beyond basic networking and logical programming patterns to get the students thinking about solving problems with basic robotics