The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[REVS] SQL Injection Signatures Evasion


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 22 Apr 2004 18:47:21 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [REVS] SQL Injection Signatures Evasion

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  SQL Injection Signatures Evasion
------------------------------------------------------------------------


SUMMARY

The document linked below describes several possible ways to evade IDS/IPS 
detection of SQL Injections. By creating unusual SQL requests it is 
possible to fool 'signature' driven IDS/IPS systems and execute SQL 
injection attacks even if an IDS/IPS is present.

DETAILS

Abstract:
In recent years, Web application security has become a focal center for 
security experts. Application attacks are constantly on the rise, posing 
new risks for the organization. One of the most dangerous and most common 
attack techniques is SQL Injection, which usually allows the hacker to 
obtain full access to the organization's Database.

With the rise in SQL Injection attacks, security vendors have begun to 
provide security measures to protect against SQL Injection. The first ones 
to claim such protection have been the various Web Application Firewall 
vendors, followed by most IDS/IPS vendors. 

Most of this protection, however is Signature based. This is obviously the 
case with common IDS/IPS vendors, as they come from the network security 
world, and revolve around signature-based protection. However, most of the 
Web Application Firewalls base their SQL Injection protection on 
signatures as well. This is due to the fact that they inspect HTTP traffic 
only, and is able to look for attack patterns only within HTTP traffic. 
Moreover, it has lately become a common belief that signatures are indeed 
sufficient for SQL Injection protection. A recently published article, 
describing, allegedly, a thorough guide for building SQL Injection 
signatures, in Snort(tm) -like format, has backed up this belief. 

The research done at Imperva's Application Defense Center shows, however, 
that providing protection against SQL Injection using signatures only is 
not enough. This paper demonstrates various techniques that can be used to 
evade SQL Injection signatures, including advanced techniques that were 
developed during the research. 

The paper further demonstrates why these techniques are actually just the 
tip of the iceberg of different evasion techniques, due to the richness of 
the SQL language. Eventually, the conclusion that the research leads to is 
that providing protection against SQL Injection using only signatures is 
simply not practical. A reasonably sized signature database will never be 
complete, while an attempt to create a complete comprehensive signature 
database, even if theoretically possible, will yield an amount of 
signatures that is impossible to handle while maintaining a reasonable 
performance requirement, and is likely to generate too many false 
positives.


ADDITIONAL INFORMATION

The paper can be found at:  <http://www.imperva.com/download.asp?id=2>; PDF 
version or  
<http://www.imperva.com/application_defense_center/white_papers/sql_injection_signatures_evasion.html>; HTML version

The information has been provided by  <mailto:[email protected]> Imperva 
Application Defense Center.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру