hi,
You can refer to the SQLinjection portion of the ModSecurity's core
rules. It is a very good reference and can be a good starting point -
http://www.modsecurity.org/projects/rules/index.html

regards,
Rick


On Sat, Jun 28, 2008 at 11:34 PM,  <[EMAIL PROTECTED]> wrote:
>
> I am studying SQL injection attacks. Generelly what patters in the incoming 
> stream presents the occurence of SQL injection attacks.
>
>
> Thanks in advance.
>
>
> Nitish
>
> ------------------------------------------------------------------------
> Test Your IDS
>
> Is your IDS deployed correctly?
> Find out quickly and easily by testing it
> with real-world attacks from CORE IMPACT.
> Go to 
> http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
> to learn more.
> ------------------------------------------------------------------------
>
>



-- 
Information (In)Security @ Where It Matters - http://blog.rickzhong.com

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it 
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
 
to learn more.
------------------------------------------------------------------------

Reply via email to