IDS mailing list archives

Re: SQL injection Patterns


From: "Rick Zhong" <sagiko () gmail com>
Date: Wed, 2 Jul 2008 02:37:15 +0800

hi,
You can refer to the SQLinjection portion of the ModSecurity's core
rules. It is a very good reference and can be a good starting point -
http://www.modsecurity.org/projects/rules/index.html

regards,
Rick


On Sat, Jun 28, 2008 at 11:34 PM,  <nitish_mathur () gmail com> wrote:

I am studying SQL injection attacks. Generelly what patters in the incoming stream presents the occurence of SQL 
injection attacks.


Thanks in advance.


Nitish

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
to learn more.
------------------------------------------------------------------------





-- 
Information (In)Security @ Where It Matters - http://blog.rickzhong.com

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it 
with real-world attacks from CORE IMPACT.
Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw 
to learn more.
------------------------------------------------------------------------


Current thread: