WebApp Sec mailing list archives

RE: [tool] Guardian () JUMPERZ NET : Rule Database is now available


From: "Michael Howard" <mikehow () microsoft com>
Date: Mon, 13 Sep 2004 21:10:19 -0700

Which database allows this?

SE/**/LECT * FRO/**/M table;

I tried MS SQL Server 2000 SP3, and MySQL 3.23.54, and both databases
complain about syntax errors.

[Writing Secure Code] http://www.microsoft.com/mspress/books/5957.asp
[Protect Your PC] http://www.microsoft.com/protect
[Blog] http://blogs.msdn.com/michael_howard

[On-line Security Training]
http://mste/training/offerings.asp?TrainingID=53074


-----Original Message-----
From: stevenr () mastek com [mailto:stevenr () mastek com] 
Sent: Saturday, September 11, 2004 1:47 AM
To: anvil () jumperz net; webappsec () securityfocus com
Subject: RE: [tool] Guardian () JUMPERZ NET : Rule Database is now
available

Hi Kanatoko

Good work, the rules set is pretty useful.

There was one suggestion, with respect to the rules for SQL injection
where you are checking for certain SQL keywords. In my experience, these
checks for blacklist SQL strings arent always foolproof.

For example, the following will be bypassed by the filter *and* will
execute.

SE/**/LECT * FRO/**/M table;

Just thought I would share about this particular type of SQL attack
signature.


Regards, 
Steven Rebello
Technology Cell,
Mastek Limited
"This email is printed using 100% recycled electrons." 


-----Original Message-----
From: Kanatoko [mailto:anvil () jumperz net] 
Sent: Wednesday, September 01, 2004 11:54 AM
To: webappsec () securityfocus com
Subject: [tool] Guardian () JUMPERZ NET : Rule Database is now available

Hi list,

Guardian () JUMPERZ NET is an open source web application firewall.
It is available at http://guardian.jumperz.net/

Rule database is now avaialbe at:
http://guardian.jumperz.net/index.html?i=004

Examples:

  - x86 NOP sled detection:
    http://guardian.jumperz.net/index.html?i=006&id=GID4

  - NULL detection:
    http://guardian.jumperz.net/index.html?i=006&id=GID11

 - Buffer overflow detection:
    http://guardian.jumperz.net/index.html?i=006&id=GID9

 - Directory(Path) traversal detection:
    http://guardian.jumperz.net/index.html?i=006&id=GID18

 - SQL injection detection:
    http://guardian.jumperz.net/index.html?i=006&id=GID44

 - XSS detection:
    http://guardian.jumperz.net/index.html?i=006&id=GID38

Thanks

Kanatoko<anvil () jumperz net>
http://www.jumperz.net/
irc.friend.td.nu:6667 #ouroboros




MASTEK
"Making a valuable difference"
Mastek in NASSCOM's 'India Top 20' Software Service Exporters List.
In the US, we're called MAJESCO

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Opinions expressed in this e-mail are those of the individual and not
that of Mastek Limited, unless specifically indicated to that effect.
Mastek Limited does not accept any responsibility or liability for it.
This e-mail and attachments (if any) transmitted with it are
confidential and/or privileged and solely for the use of the intended
person or entity to which it is addressed. Any review, re-transmission,
dissemination or other use of or taking of any action in reliance upon
this information by persons or entities other than the intended
recipient is prohibited. This e-mail and its attachments have been
scanned for the presence of computer viruses. It is the responsibility
of the recipient to run the virus check on e-mails and attachments
before opening them. If you have received this e-mail in error, kindly
delete this e-mail from all computers.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Current thread: