Solved

Site being hacked?

Posted on 2006-07-10
5
1,111 Views
Last Modified: 2008-03-10
This is the second time (two different IP's) I've seen this in the past 3 weeks.  Someone from China looks to be trying to use a SQL Injection technique to hack one of my sites.  What is interesting is that both times, they tried the exact same order of manipulation to the querystring, so I'm wondering if this is a program or something they are running.  Has anyone seen this?

News.aspx?ArticleID=1' and char(124)+user+char(124)=0 and ''='
News.aspx?ArticleID=1 and char(124)+user+char(124)=0
News.aspx?ArticleID=1' and char(124)+user+char(124)=0 and '%'='
News.aspx?ArticleID=1 and 1=1
News.aspx?ArticleID=1 and 1=2
News.aspx?ArticleID=1' and 1=1 and ''='

Both times it has been in the exact same order...  When I look at this technique, even if my site was suspect to sql injection, this stuff wouldn't even do anything.  

I put a few of this stuff into google, and it returned a site that has a few of these "techniques" listed on website, so I wonder if they are standard techniques.  Has anyone seen something like this before.  Should I be worried?
0
Comment
Question by:thrill_house
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 150 total points
ID: 17073973
Nessus, Gfi Languard Network Security scanner, any number of these kinds of tools can look for those vulnerabilites and report on them. You can create your own script to do these things quite easily, so it's hard to say for certain. You should follow best practices, and try to harden your systems as much as possible...
Only allow necessary ports in and out of your servers, try to block all unnecessary ports
Keep up2date with OS patches, as well as web-server patches, and software patches, like php, sql, java etc...
Install AV where possible, keep that up2date and schedule regualr scans, you may also consider getting an IDS like Snort implimented.
Log readers and alerting software like Gfi's SELM, "Snare" or KiwiTools can help you detect possible attempts also
http://www.kiwisyslog.com/links.htm
http://www.intersectalliance.com/projects/SnareWindows/index.html
-rich
0
 
LVL 1

Accepted Solution

by:
PugnaciousOne earned 200 total points
ID: 17108074
Filter the input and url header to your site by disallowing any special characters and re-parsing the URL.  This should stop most SQL injection attacks cold.   This is definitely a standard technique.
0
 
LVL 4

Assisted Solution

by:kruptos
kruptos earned 150 total points
ID: 17158670
Yeap,

This is a standard technique, mainly used just to see a sites DB is open to certain types of SQL Injection. Also, Pugnacious one had a good idea for helping crack down on this.

If you also google "prevent sql injection" you will get some good ideas to help combat these attacks.

http://msdn.microsoft.com/msdnmag/issues/04/09/SQLInjection/

http://cyberforge.com/weblog/aniltj/archive/2004/05/21/535.aspx

Also,

Read up on some tutorials so you can get inside the mind of the bad guys :-)

http://www.governmentsecurity.org/articles/SQLinjectionBasicTutorial.php



But, to answer you last question...... Always be worried, when you stop being worried the crackers come out to play :-)

Hope this helps,

-Kruptos
0
 
LVL 1

Expert Comment

by:PugnaciousOne
ID: 17159695
Also, since you're using asp.net i'm not completely sure this code applies, as i use ASP, but you can use something like this:

< % response.write(Server.URLEncode("http://www.yoururl.com")) % >

and

< % response.write(Server.HTMLEncode("The image tag: < img >")) % >

These re-encode the url and various site code.  Basically it's sanitizing the input.
0
 

Expert Comment

by:Gangloff
ID: 23515304
I also see this exact thing in my web logs.

This is most probably a SQL injection attempt like people have suggested above. And the solutions do apply.

This particular sequence checks to see if your server is vulnerable to the particular attack. Basically, you've been probed for a potential vulnerability... When you see URLs like that or such messages in the logs, it's always good to try it yourself and see what happens. In most cases, nothing happens either because your system is not the type/version that is being targeted by the probe or your system is not vulnerable to the issue (your system is correctly patched, you don't have the earlier version that is being targeted, etc.).
0

Featured Post

Surfing Is Meant To Be Done Outdoors

Featuring its rugged IP67 compliant exterior and delivering broad, fast, and reliable Wi-Fi coverage, the AP322 is the ideal solution for the outdoors. Manage this AP with either a Firebox as a gateway controller, or with the Wi-Fi Cloud for an expanded set of management features

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question