<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SQL injection recon detection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012209#M79501</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We're working on improved coverage for SQL injection attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;P&gt;IPS Signature Team&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Jul 2008 14:23:42 GMT</pubDate>
    <dc:creator>mzeiser</dc:creator>
    <dc:date>2008-07-11T14:23:42Z</dc:date>
    <item>
      <title>SQL injection recon detection</title>
      <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012204#M79496</link>
      <description>&lt;P&gt;Why are there no vendor provided signatures that detect SQL injection reconnaissance?  I recently did an internal pen test and it reminded me again of this deficiency. I've been meaning to write my own for the longest time, but frankly...why should I need to?  It is simply amazing to me that I can throw standard SQL injection tests at a web app and our network IDS is "blind" to them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://ha.ckers.org/sqlinjection/" target="_blank"&gt;http://ha.ckers.org/sqlinjection/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:11:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012204#M79496</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2019-03-10T11:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: SQL injection recon detection</title>
      <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012205#M79497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Join the club.  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;  I got fed up too and am writing all my own for detecting excessive SELECTs, INSERTs/UPDATEs/DELETEs etc but with obfuscation the task becomes very difficult.  This really needs to happen within the http-server engine but I'm using multi-string because I wanted a list of keywords in a certain order.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See also: &lt;A class="jive-link-custom" href="http://isc.sans.org/diary.html?storyid=4565" target="_blank"&gt;http://isc.sans.org/diary.html?storyid=4565&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jul 2008 18:04:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012205#M79497</guid>
      <dc:creator>attmidsteam</dc:creator>
      <dc:date>2008-07-07T18:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: SQL injection recon detection</title>
      <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012206#M79498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The days of IDS are coming to an end. I know IPS is expensive, but they are well worth the price.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below are a few SQL signatures you can add to a SNORT IDS or some other IDS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;|90909090|&lt;/P&gt;&lt;P&gt;|04010101010101|&lt;/P&gt;&lt;P&gt;--'|22|'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if that helps.&lt;/P&gt;&lt;P&gt;~TS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jul 2008 13:50:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012206#M79498</guid>
      <dc:creator>TradeSecrets</dc:creator>
      <dc:date>2008-07-11T13:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: SQL injection recon detection</title>
      <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012207#M79499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All I saw posted were 3 small strings which WOULD not protect against SQL injections, sorry (and would trigger some massive false positives).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An IPS is the same thing as an IDS but with the 'magic' buzzword of being inline.  The same pattern based technology is still being utilized.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jul 2008 13:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012207#M79499</guid>
      <dc:creator>attmidsteam</dc:creator>
      <dc:date>2008-07-11T13:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: SQL injection recon detection</title>
      <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012208#M79500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;agreed.  In the vast majority of cases, IDS isn't "good enough" to be IPS.  For me, IPS is policy/security enforcement and belongs on a firewall.  IDS is policy/security monitoring, which doesn't necessarily need to be inline.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;back to the topic...I'm not really looking at detecting/preventing [insert flavor of the day] SQL injection worm.  I'm looking at detecting a user using the typical patterns used to test for SQL vulnerabilities. They will almost certainly be easy to evade, but we do what we can.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jul 2008 14:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012208#M79500</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2008-07-11T14:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: SQL injection recon detection</title>
      <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012209#M79501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We're working on improved coverage for SQL injection attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;P&gt;IPS Signature Team&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jul 2008 14:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012209#M79501</guid>
      <dc:creator>mzeiser</dc:creator>
      <dc:date>2008-07-11T14:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: SQL injection recon detection</title>
      <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012210#M79502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That would be awesome.  Do you mean, "we're thinking about it" or, "we're sorting out the proper engines and regex's to use now"?? &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jul 2008 14:31:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012210#M79502</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2008-07-11T14:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: SQL injection recon detection</title>
      <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012211#M79503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Don't be sorry. It doesn't sound like you have a clue what you are taking about anyways. These signatures were pulled from a leading IPS vendors device. Just so you know IPS and IDS are not the same thing. Can I take your star away...&lt;/P&gt;&lt;P&gt;oH whoops.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jul 2008 14:35:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012211#M79503</guid>
      <dc:creator>TradeSecrets</dc:creator>
      <dc:date>2008-07-11T14:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: SQL injection recon detection</title>
      <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012212#M79504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It means "We're sorting out the proper engines and regex's to use".&lt;/P&gt;&lt;P&gt;SQL injection is quite a problem to catch though, as you basically hand something like source code to an interpreter, which means an attack can be encoded and vary in a thousand different ways. As we do try to create intelligent signatures, instead of simply hunting for fixed and most often easily change strings in a stream, this makes writing signatures for sql injection attacks kind of hard. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jul 2008 14:40:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012212#M79504</guid>
      <dc:creator>mzeiser</dc:creator>
      <dc:date>2008-07-11T14:40:38Z</dc:date>
    </item>
    <item>
      <title>Re: SQL injection recon detection</title>
      <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012213#M79505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let's not get into a squabble about IDS versus IPS, they're market driven terms that mean different things to different people. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don't provide any context for the regex you provided.  What is it specifically designed to detect/protect?  It looks like Snort regex, is it?  Why not post the whole rule to give some context?  I need more than just a regex to create a useful signature.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jul 2008 14:46:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012213#M79505</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2008-07-11T14:46:25Z</dc:date>
    </item>
    <item>
      <title>Re: SQL injection recon detection</title>
      <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012214#M79506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;TradeSecrets:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide the full signature so we can discuss it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jul 2008 15:42:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012214#M79506</guid>
      <dc:creator>attmidsteam</dc:creator>
      <dc:date>2008-07-11T15:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: SQL injection recon detection</title>
      <link>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012215#M79509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree in the sense that the SQL Signature set of ASA IPS is a bit poor. If it can help someone, I've wrote my oun signature in order to catch an attacker. It's working fine, and I think that is easy to modify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------&lt;/P&gt;&lt;P&gt;signatures 60000 0 &lt;/P&gt;&lt;P&gt;alert-severity medium&lt;/P&gt;&lt;P&gt;sig-fidelity-rating 75&lt;/P&gt;&lt;P&gt;sig-description&lt;/P&gt;&lt;P&gt;sig-name CHZ SQL Injection&lt;/P&gt;&lt;P&gt;sig-string-info CHZ SQL Injection&lt;/P&gt;&lt;P&gt;sig-comment SQL Injection written by CHZ&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;engine string-tcp&lt;/P&gt;&lt;P&gt;event-action produce-alert|deny-packet-inline|reset-tcp-connection&lt;/P&gt;&lt;P&gt;regex-string ([Dd][Ee][Cc][Ll][Aa][Rr][Ee])\%20\@.\%20([Vv][Aa][Rr][Cc][Hh][Aa][Rr])(.*);([Ss][Ee][Tt])\%20\@.=([Cc][Aa][Ss][Tt])&lt;/P&gt;&lt;P&gt;service-ports #WEBPORTS&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;alert-frequency&lt;/P&gt;&lt;P&gt;summary-mode summarize&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;status&lt;/P&gt;&lt;P&gt;enabled true&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;specify-mars-category yes&lt;/P&gt;&lt;P&gt;mars-category DoS/WebServer&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;-------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jul 2008 13:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-injection-recon-detection/m-p/1012215#M79509</guid>
      <dc:creator>christianz</dc:creator>
      <dc:date>2008-07-16T13:59:10Z</dc:date>
    </item>
  </channel>
</rss>

