What is SQL Injection Attacks
With the growing up of B/S model application development, more and more programmer write program with it. Unfortunately, many programmers did not judge the validity of users' input data during encoding, and then, there will be security risk in the application.
Malicious attackers submit a special section of database query code to the server, the server will disclosure some sensitive information when respond with corresponding result. This is SQL Injection Attack. The main trend Firewall currently will not alarm when there is SQL attack because of the SQL Injection is via normal point and hidden and difficult to be detected, seemingly normal website visit.
The danger of SQL Injection Attack
The danger of SQL Injection Attack
According to the statistics of CVE in 2006, there are more than 70% attacks based on web application. The SQL Injection Attack increase year by year, it arrives at 1078 in 2006. Even though, these data is only for the vulnerability in universal applications currently.
The danger of SQL Injection Attack including:
Change the data in database without authorization.
Gain the administration authority of a site without authorization.
Maliciously change content of a site without authorization.
XSS attacks.
Gain the control authority of the server without authorization.
Add, delete and change the accounts in the server without authorization.
The process of detect and revert SQL Injection Attack with Sax2
Gain the administration authority of a site without authorization.
Maliciously change content of a site without authorization.
XSS attacks.
Gain the control authority of the server without authorization.
Add, delete and change the accounts in the server without authorization.
The process of detect and revert SQL Injection Attack with Sax2
Some IDS softwares will execute effective detection for SQL Injection Attack, though, firewall can not. Now, we go to the process of detect and revert SQL Injection Attack with IDS software Sax2.
The steps of SQL Injection Attack are:
a) Determine environment to find the injection point.
b) Determine the type of database.
c) Guess datasheet.
d) Guess the field.
e) Guess the content.
b) Determine the type of database.
c) Guess datasheet.
d) Guess the field.
e) Guess the content.
The steps "Guess datasheet", "Guess the field" and "Guess the content" are very important fro SQL Injection Attack during the full process. Let's analyze these there steps.
Sax2 will detect and alarm the attacks in network real-time. It will show the in the table Event when there is SQL Injection Attacks, see the figure 1.
Figure 1 Sax2 alarm the MS_SQL Injection Attacks real-time
The selected event in the Figure 1 shows the attacker's IP 192.168.21.103, the victim's IP 125.65.112.10. And the original message is "slect * from [dirs]", means enquire whether there is a datasheet named "dirs" in current database, in the Original Communication view.
The attacker will repeat the operation to gain the expected datasheet. He will try to guess the filed in the datasheet if found the corresponding datasheet in the database.
The attacker will repeat the operation to gain the expected datasheet. He will try to guess the filed in the datasheet if found the corresponding datasheet in the database.
Figure 2 Sax2 analysis the attacker is guessing the filed in the admin database
The code in the red circle in the Figure 2 show the attacker is guessing the "paths" filed in the admin database. Also, the attacker will repeat the operation till find the corresponding filed.
The attacker will determine the length of the filed and guess the content after found the corresponding filed. It will be a SQL Injection Attack after the attacker guess the content in the filed successfully. Sometimes, the attacker has to decryption the content if it in MD5 encryption.
Above is the whole process of SQL Injection Attack and we detect it with Sax2. As we know, Sax2 can effictively detect and alarm the SQL Injection Attack when it occurs. IDS software Sax2 is a useful tool for SQL Injection Attack and make your network security combine with firewall software.
Comments
Post a Comment