Snort mailing list archives

Re: Undetected SQL Injection


From: Jason Haar <Jason.Haar () trimble co nz>
Date: Tue, 24 Jun 2008 11:13:56 +1200

Curtis LaMasters wrote:
I am running Snort 2.7 on my firewalls and have still somehow been SQL 
injected.  I have the SQL rules, MySQL rules, IIS Rules, and a few 
more but it sill did not detect.  Below I have part of the IIS log 
where the injection (attempt) was done. I was hopeing someone could 
shed some light on the problem. Please let me know if I need to 
provide any additional information.

As the sample URIs you gave imply it was some sort of store, can I ask 
if it was HTTPS or HTTP? If it was over HTTPS, then snort wouldn't have 
been able to decipher it - as it's encrypted :-)

If you are using HTTPS, then you have to "convert" that traffic back 
into an unencrypted format before any analysis can be done. e.g. reverse 
proxies, Web Application Firewalls, etc.


-- 
Cheers

Jason Haar
Information Security Manager, Trimble Navigation Ltd.
Phone: +64 3 9635 377 Fax: +64 3 9635 417
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1


-------------------------------------------------------------------------
Check out the new SourceForge.net Marketplace.
It's the best place to buy or sell services for
just about anything Open Source.
http://sourceforge.net/services/buy/index.php
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users


Current thread: