Incident Response: The Importance of Anti-Virus

Heading home from the CSS Security Global Summit on Friday, I got stuck in Cincinnati’s airport.  While walking through baggage claim, I saw this displayed on the arrivals board: (I didn’t have a proper camera with me so, if that’s hard to read, it’s a Symantec AntiVirus Auto-Protect notification of a trojan horse found.  Symantec…

0

SQL Injection Hijinks

or Why I Keep Harping On Blacklisting   Summary: An incident reveals attempts to get around blacklisting by manipulating behavior in ASP, illustrating the weakness of blacklist approaches. A new version of UrlScan is shipping today with a change specifically to address this. Discussion: I was working with a colleague on an incident last week…

1

PASSGEN

Occasionally, I see a security incident where one of the things that went wrong was that all of the customer’s machines have the same password for the built-in administrator’s account.  Whenever this happens, I suggest the PASSGEN tool that was included with the book "Protect Your Windows Network" by Steve Riley and Jesper Johansson.  Obviously,…

1

Input Validation Is Not The Answer

I just sent a piece of e-mail to my team about input validation and SQL injection and it occurred to me that I’ve been meaning to get into this here, too: If you’re trying to solve a SQL injection problem, input validation is NOT the answer! There, I’ve said it.   I keep seeing blog…

2

SQL Storm: Possible ASP.Net

I’ve had an unconfirmed report that the SQL Storm attacks are now also affecting ASP.Net pages, specifically with a  URL of http://www.chliyi.com/m.js (this appears to be offline currently but I wouldn’t suggest browsing there…) being injected into those pages.  My team hasn’t worked on any incidents yet so I can’t confirm that it is the…

0

SQL Injection: Trends & Guidance

I’ve been working with the SWI team to write a comprehensive overview of the SQL Storm attacks with guidance for IT administrators, developers, and end users.  That article is posted at sql-injection-attack.aspx. For developers, specifically, Bala Neerumalla has written an excellent overview of SQL injection and classic ASP code for MSDN at cc676512.aspx.  This is…

0

SQLInjectionFinder

My colleague Greg, who has forgotten more about command line scripting than I will ever know, put together a sample on CodePlex that automates finding SQL injection attacks from the ongoing mass SQL injection attack ("SQL Storm", as I saw it dubbed today).  This is a fairly convenient approach to searching logfiles on an IIS…

0

SQL Injection Mitigation: Using Parameterized Queries part 2 (types and recordsets)

(Part 1 is here) Previously, I provided a simple example of using parameterized queries in classic ASP; however, that sample lacked a few things such as explicit typing for the parameters.  It also created a read-only ADODB.RecordSet which, obviously, isn’t one-size-fits-all. Typing In the last installment, we had worked up this code to do our…

9

SQL Injection Mitigation: Using Parameterized Queries

Michael Howard wrote an excellent article yesterday on how the SDL addresses SQL injection.  He walks through three coding requirements/defenses: Use SQL Parameterized Queries Use Stored Procedures Use SQL Execute-only Permissions As Michael points out, only the first, parameterized queries, remedies the problem.  The other two provide additional defense. The good news is that changing…

14

SQL Injection — A Comment

Kumar comments here and I think he has some questions/concerns that are worth addressing.  I’m going to add my own comments (and, please note, the comments I make here are my own and do not necessarily reflect Microsoft’s corporate opinions). ————————————————————————————— My site extensively uses asp and sql server. My site ranking is good with…

1