Story: Testing of PostgreSQL database and set up logging/add recommendations

(Copy and paste of the various notes pentesting postgresql)

The HINT in an ERROR message leaks information PL/pgSQL Errors and Messages

The ERROR message leaks information PL/pgSQL Errors and Messages

DROP index statement PostgreSQL DROP INDEX Statement

LIST index statement (which part is reconnaissance though PostgreSQL List Indexes)

Being able to find the Postgres version

Being able to query the type of index

Being able to DELETE http://www.postgresqltutorial.com/postgresql-delete/

An attempt was made to DELETE http://www.postgresqltutorial.com/postgresql-delete/

A new role was CREATED
CREATE ROLE username NOINHERIT LOGIN PASSWORD password;
CREATE ROLE role_name;

Roles have been set
GRANT role_2 TO role_1;

Database has been deleted
DROP DATABASE [IF EXISTS] db_name;

A column has been dropped
ALTER TABLE table_name DROP COLUMN column_name;

A table has been dropped
DROP TABLE [IF EXISTS] table_name CASCADE;

How to prevent disaster recovery Schedule - PGConf.EU 2019 - PostgreSQL Conference Europe 2019

No data at rest encryption https://www.cybertec-postgresql.com/en/products/postgresql-transparent-data-encryption/

Blocks are decrypted as they are read from disk (side channel attack) https://www.cybertec-postgresql.com/en/products/postgresql-transparent-data-encryption/

Is the database first nitialized with encryption in mind and that the key used for initializing the database is accessible to the server during startup.

The following are not encrypted: https://www.cybertec-postgresql.com/en/products/postgresql-transparent-data-encryption/
Transport encryption (client / server) via SSL; Encrypted replication; Fully secured replicas

The Client connection to the database is not encrypted (ie SSL)

Postgres SQL injections Postgres SQL Injection Cheat Sheet | pentestmonkey

Being able to use WAL to shutdown PostgreSQL PostgreSQL: Documentation: 9.3: Continuous Archiving and Point-in-Time Recovery (PITR) (filling up pg_xlog/ directory)

Can you enumerate the PostgreSQL details Penetration Testing: Brute Forcing Postgres (use nmap against metasploitable)

Can you brute force into PostgreSQL database Penetration Testing: Brute Forcing Postgres (use msfconsole and wordlists)

PENTESTER’S GUIDE TO POSTGRES https://hakin9.org/a-penetration-testers-guide-to-postgresql/

METASPLOIT POSTGRESQL SETUP Metasploit Postgres Setup - Fedora Project Wiki

Admin Postgres Auxiliary Modules ON METASPLOIT https://www.offensive-security.com/metasploit-unleashed/admin-postgres-auxiliary-modules/