hi, You can refer to the SQLinjection portion of the ModSecurity's core rules. It is a very good reference and can be a good starting point - http://www.modsecurity.org/projects/rules/index.html
regards, Rick On Sat, Jun 28, 2008 at 11:34 PM, <[EMAIL PROTECTED]> wrote: > > I am studying SQL injection attacks. Generelly what patters in the incoming > stream presents the occurence of SQL injection attacks. > > > Thanks in advance. > > > Nitish > > ------------------------------------------------------------------------ > Test Your IDS > > Is your IDS deployed correctly? > Find out quickly and easily by testing it > with real-world attacks from CORE IMPACT. > Go to > http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw > to learn more. > ------------------------------------------------------------------------ > > -- Information (In)Security @ Where It Matters - http://blog.rickzhong.com ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
