Re: [ossec-list] OSSEC for Sql injection attack

2011-02-05 Thread Satish Patel
This is kind of cool, we can atleast stop future attacks. Also we can place honeypot and fine tune ossec for SQL injection kind of attack. -- Sent from my iPhone On Feb 5, 2011, at 11:52 AM, Michael Starks > wrote: Exactly. The first injection connection can be bad. I have run systems tha

Re: [ossec-list] OSSEC for Sql injection attack

2011-02-05 Thread Jeremy Lee
Oops. Meant to reply to Michael's post - also I had a 'typo' and added "HIDS" (OSSEC is a HIDS...DUH) - I just meant "HIPS (inline)" On Sat, Feb 5, 2011 at 9:01 AM, Jeremy Lee wrote: > That gets me thinking - any chance Daniel and the crew would consider > implementing a HIPS/HIDS (inline) exten

Re: [ossec-list] OSSEC for Sql injection attack

2011-02-05 Thread Jeremy Lee
That gets me thinking - any chance Daniel and the crew would consider implementing a HIPS/HIDS (inline) extension for OSSEC? That would be awesome... Of course, we have already mentioned ModSecurity. There's another one that looks really promising called "AppSensor" (check the OWASP pages - it's al

Re: [ossec-list] OSSEC for Sql injection attack

2011-02-05 Thread Michael Starks
Exactly. The first injection connection can be bad. I have run systems that were found to be vulnerable to SQL injection. OSSEC detected the attack, but we were being hit from multiple IPs over a long time at a low rate. Active response wouldn't have helped. We were able to use OSSECs logs (and

Re: [ossec-list] OSSEC for Sql injection attack

2011-02-05 Thread Steven Stern
On 02/04/2011 09:46 PM, tanishk lakhaani wrote: > Yes, the active response works on the basis of this only...When u > launch a scan, a few attacks will acually pass thru, then only the agent > will forward the corresponding logs to the OSSEC Server, who will then > decide whether to use Active Resp

Re: [ossec-list] OSSEC for Sql injection attack

2011-02-05 Thread Michael Starks
On 02/04/2011 11:51 PM, Jeremy Lee wrote: I think his point is that one attack 'passing' through is enough. Think about it - if they can get an attack through that successfully commits a DROP TABLE statement, you're already in the black. Whether you've dropped them at that point or not doesn't re

Re: [ossec-list] OSSEC for Sql injection attack

2011-02-04 Thread Jeremy Lee
I think his point is that one attack 'passing' through is enough. Think about it - if they can get an attack through that successfully commits a DROP TABLE statement, you're already in the black. Whether you've dropped them at that point or not doesn't really matter because they've accomplished wha

Re: [ossec-list] OSSEC for Sql injection attack

2011-02-04 Thread tanishk lakhaani
Yes, the active response works on the basis of this only...When u launch a scan, a few attacks will acually pass thru, then only the agent will forward the corresponding logs to the OSSEC Server, who will then decide whether to use Active Response or not. Once the server decides to use active respo

Re: [ossec-list] OSSEC for Sql injection attack

2011-02-04 Thread Steven Stern
On 02/04/2011 12:39 PM, tanishk lakhaani wrote: > Well, I think that deploying active response can be a good way out to > prevent SQL Injection based attacks. However, there may be a few issues > related to it viz..decoders in ossec are designed to indicate a SQL > Injection attack even in case SEL

Re: [ossec-list] OSSEC for Sql injection attack

2011-02-04 Thread tanishk lakhaani
Well, I think that deploying active response can be a good way out to prevent SQL Injection based attacks. However, there may be a few issues related to it viz..decoders in ossec are designed to indicate a SQL Injection attack even in case SELEC/UNION or any other SQL Based command is used in the R

Re: [ossec-list] OSSEC for Sql injection attack

2011-02-03 Thread Steven Stern
On 02/03/2011 12:00 PM, satish patel wrote: > How efficient OSSEC is to stop SQL injection ? If not then i have to > move on mod_security > > Is anybody out there who using ossec for sql injection ? > > > Thanks, > S It's very good at detecting SQL injection, but your code shouldn't () be suscep

Re: [ossec-list] OSSEC for Sql injection attack

2011-02-03 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 If you really want to stop SQL injection you need to update your application code. Bolting on security will only buy you some wiggle room, it won't solve the problem. OSSEC is very good at recognizing keyword signatures in URL requests after they are

Re: [ossec-list] OSSEC for Sql injection attack

2011-02-03 Thread Jeremy Lee
See here: http://www.ossec.net/wiki/Samples_of_attacks_detected_by_ossec I would think the only issue here is that OSSEC is *responsive* and will look for patterns from the logs post-occurrence. So if your app is vulnerable to SQL injection, theoretically, the attacker would get in on the first

[ossec-list] OSSEC for Sql injection attack

2011-02-03 Thread satish patel
How efficient OSSEC is to stop SQL injection ? If not then i have to move on mod_security Is anybody out there who using ossec for sql injection ? Thanks, S