IDS mailing list archives
Re: SQL injection Patterns
From: "Rick Zhong" <sagiko () gmail com>
Date: Wed, 2 Jul 2008 02:37:15 +0800
hi, You can refer to the SQLinjection portion of the ModSecurity's core rules. It is a very good reference and can be a good starting point - http://www.modsecurity.org/projects/rules/index.html regards, Rick On Sat, Jun 28, 2008 at 11:34 PM, <nitish_mathur () gmail com> wrote:
I am studying SQL injection attacks. Generelly what patters in the incoming stream presents the occurence of SQL injection attacks. Thanks in advance. Nitish ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
-- Information (In)Security @ Where It Matters - http://blog.rickzhong.com ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
Current thread:
- Re: SQL injection Patterns M. GAD (Jul 01)
- <Possible follow-ups>
- Re: SQL injection Patterns Ravi Chunduru (Jul 01)
- Re: SQL injection Patterns Rick Zhong (Jul 02)