Snort mailing list archives

Re: SQL Injection Signature


From: waldo kitty <wkitty42 () windstream net>
Date: Thu, 29 Sep 2011 13:37:13 -0400

On 9/28/2011 15:40, Ahmed Qaisi wrote:
Thanks for your response...

you're welcome... let's also keep this on the list so that others may also 
benefit or correct me if in wrong on something ;)

So should I understand that ""http_inspect: U ENCODING "" has been triggered for
the SQL Injection I performed or could be something else?

U_encoding is one thing detected and one thing only... by itself, it does not 
indicate SQL Injection or anything else... it is only telling you that it 
detected U_encoding... nothing more and nothing less...

[quote from the snort manual]
u_encode <yes|no>

This option emulates the IIS %u encoding scheme. How the %u encoding scheme 
works is as follows: the encoding scheme is started by a %u followed by 4 
characters, like %uxxxx. The xxxx is a hex-encoded value that correlates to an 
IIS Unicode codepoint. This value can most definitely be ASCII. An ASCII 
character is encoded like %u002f = /, %u002e = ., etc. If no iis unicode map is 
specified before or after this option, the default codemap is used.

You should alert on %u encodings, because we are not aware of any legitimate 
clients that use this encoding. So it is most likely someone trying to be covert.
[/quote]

On Thu, Sep 29, 2011 at 8:20 AM, waldo kitty <wkitty42 () windstream net
<mailto:wkitty42 () windstream net>> wrote:

    On 9/28/2011 13:49, Ahmed Qaisi wrote:
     > Hi
     >
     > I'm wondering what alert does Snort trigger for SQL Injection attacks.

    there are numerous ones...

     > I mean what does it look like?

    what? the rule? there is no one particular rule... there are several and they
    search the content of the traffic looking for a match...

     > I performed some SQL Injection on my web server but the IDS alerted something
     > like "http_inspect: U ENCODING "...????

    if you were using that type of encoding, it is possible that that process found
    a match... it is possible to get more than one alert for a particular traffic
    stream...


    ------------------------------------------------------------------------------
    All the data continuously generated in your IT infrastructure contains a
    definitive record of customers, application performance, security
    threats, fraudulent activity and more. Splunk takes this data and makes
    sense of it. Business sense. IT sense. Common sense.
    http://p.sf.net/sfu/splunk-d2dcopy1
    _______________________________________________
    Snort-users mailing list
    Snort-users () lists sourceforge net <mailto:Snort-users () lists sourceforge net>
    Go to this URL to change user options or unsubscribe:
    https://lists.sourceforge.net/lists/listinfo/snort-users
    Snort-users list archive:
    http://www.geocrawler.com/redir-sf.php3?list=snort-users

    Please visit http://blog.snort.org to stay current on all the latest Snort news!




------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort news!


Current thread: