3
I have an app .NET Windows Forms connecting to a server SQL Server directly, without the use of an intermediate layer as a Webservice or Webapi, through SqlConnection
. This application is installed on the clients' computer while the server is available over the internet.
What is the best way, without changing the entire application, to prevent the connection string (Connection string) is captured through a Sniffer type the Wireshark running on the same network?
Even if the user and password are hidden, any return that the bank sends to the application can be captured by Sniffer. If you do a "select * from user" will be shown all the data of all users in the received traffic even if the application does not display any of this data.
– Maicon Carraro
Just use SSL, and problem solved.
– Miguel Angelo
Out work to implement after just use
SSLstrip
to capture.– Maicon Carraro
What Maicon said, that "all data of all users in traffic" is natural, even with webservices it happens. The idea is to prevent someone getting authentication to manipulate the data outside of your application. I will try to implement the option Encrypt=yes of connectionString, then if I succeed I will come back here to mark the answer.
– iuristona
SQL Server does not use HTTPS, but yes TSL/SSL, so Sslstrip should not be able to read SQL Server transmissions, as the second works on HTTPS.
– Miguel Angelo
@Miguelangelo Error of mine regarding capturing the encrypted connection of SQL Server, had taken into account only you have mentioned the use of SSL. At least so far né huaehaeuhea and won +1 :)
– Maicon Carraro