(Copy and paste of the various notes pentesting postgresql)
The HINT in an ERROR message leaks information PL/pgSQL Errors and Messages
The ERROR message leaks information PL/pgSQL Errors and Messages
DROP index statement PostgreSQL DROP INDEX Statement
LIST index statement (which part is reconnaissance though PostgreSQL List Indexes)
Being able to find the Postgres version
Being able to query the type of index
Being able to DELETE http://www.postgresqltutorial.com/postgresql-delete/
An attempt was made to DELETE http://www.postgresqltutorial.com/postgresql-delete/
A new role was CREATED
CREATE ROLE username NOINHERIT LOGIN PASSWORD password;
CREATE ROLE role_name;
Roles have been set
GRANT role_2 TO role_1;
Database has been deleted
DROP DATABASE [IF EXISTS] db_name;
A column has been dropped
ALTER TABLE table_name DROP COLUMN column_name;
A table has been dropped
DROP TABLE [IF EXISTS] table_name CASCADE;
How to prevent disaster recovery Schedule - PGConf.EU 2019 - PostgreSQL Conference Europe 2019
No data at rest encryption https://www.cybertec-postgresql.com/en/products/postgresql-transparent-data-encryption/
Blocks are decrypted as they are read from disk (side channel attack) https://www.cybertec-postgresql.com/en/products/postgresql-transparent-data-encryption/
Is the database first nitialized with encryption in mind and that the key used for initializing the database is accessible to the server during startup.
The following are not encrypted: https://www.cybertec-postgresql.com/en/products/postgresql-transparent-data-encryption/
Transport encryption (client / server) via SSL; Encrypted replication; Fully secured replicas
The Client connection to the database is not encrypted (ie SSL)
Postgres SQL injections Postgres SQL Injection Cheat Sheet | pentestmonkey
Being able to use WAL to shutdown PostgreSQL PostgreSQL: Documentation: 9.3: Continuous Archiving and Point-in-Time Recovery (PITR) (filling up pg_xlog/ directory)
Can you enumerate the PostgreSQL details Penetration Testing: Brute Forcing Postgres (use nmap against metasploitable)
Can you brute force into PostgreSQL database Penetration Testing: Brute Forcing Postgres (use msfconsole and wordlists)
PENTESTER’S GUIDE TO POSTGRES https://hakin9.org/a-penetration-testers-guide-to-postgresql/
METASPLOIT POSTGRESQL SETUP Metasploit Postgres Setup - Fedora Project Wiki
Admin Postgres Auxiliary Modules ON METASPLOIT https://www.offensive-security.com/metasploit-unleashed/admin-postgres-auxiliary-modules/