Snort mailing list archives
Re: SQL Injection Signature
From: waldo kitty <wkitty42 () windstream net>
Date: Thu, 29 Sep 2011 13:37:13 -0400
On 9/28/2011 15:40, Ahmed Qaisi wrote:
Thanks for your response...
you're welcome... let's also keep this on the list so that others may also benefit or correct me if in wrong on something ;)
So should I understand that ""http_inspect: U ENCODING "" has been triggered for the SQL Injection I performed or could be something else?
U_encoding is one thing detected and one thing only... by itself, it does not indicate SQL Injection or anything else... it is only telling you that it detected U_encoding... nothing more and nothing less... [quote from the snort manual] u_encode <yes|no> This option emulates the IIS %u encoding scheme. How the %u encoding scheme works is as follows: the encoding scheme is started by a %u followed by 4 characters, like %uxxxx. The xxxx is a hex-encoded value that correlates to an IIS Unicode codepoint. This value can most definitely be ASCII. An ASCII character is encoded like %u002f = /, %u002e = ., etc. If no iis unicode map is specified before or after this option, the default codemap is used. You should alert on %u encodings, because we are not aware of any legitimate clients that use this encoding. So it is most likely someone trying to be covert. [/quote]
On Thu, Sep 29, 2011 at 8:20 AM, waldo kitty <wkitty42 () windstream net <mailto:wkitty42 () windstream net>> wrote: On 9/28/2011 13:49, Ahmed Qaisi wrote: > Hi > > I'm wondering what alert does Snort trigger for SQL Injection attacks. there are numerous ones... > I mean what does it look like? what? the rule? there is no one particular rule... there are several and they search the content of the traffic looking for a match... > I performed some SQL Injection on my web server but the IDS alerted something > like "http_inspect: U ENCODING "...???? if you were using that type of encoding, it is possible that that process found a match... it is possible to get more than one alert for a particular traffic stream... ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net <mailto:Snort-users () lists sourceforge net> Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users Please visit http://blog.snort.org to stay current on all the latest Snort news!
------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users Please visit http://blog.snort.org to stay current on all the latest Snort news!
Current thread:
- SQL Injection Signature Ahmed Qaisi (Sep 28)
- Re: SQL Injection Signature waldo kitty (Sep 28)
- Message not available
- Re: SQL Injection Signature waldo kitty (Sep 29)
- Message not available
- Re: SQL Injection Signature waldo kitty (Sep 28)