Is anybody out there who using ossec for sql injection ?
Thanks,
S
--
-- Steve
If you really want to stop SQL injection you need to update your
application code. Bolting on security will only buy you some wiggle
room, it won't solve the problem.
OSSEC is very good at recognizing keyword signatures in URL requests
after they are written to the log, but at that point the injection has
taken place. OSSEC is not an intrusion prevention system, it is an
intrusion detection system. An effective use of OSSEC would be to
detect potential SQL injection attacks so they can be investigated and
vulnerable code remediated or incident response can ensue.
Justin C. Klein Keane
Information Security and Unix Systems
University of Pennsylvania
School of Arts and Sciences
3600 Market St.
Room 520
Philadelphia, PA 19104
215.898.0236(p)
215.573.3166(f)
The digital signature on this e-mail may be confirmed using the
PGP key located at: http://www.sas.upenn.edu/computing/user/3
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/
iEYEARECAAYFAk1K9w4ACgkQR4a3EW2yjlR57wCePVZP3SHyBtitAy/ntDXlethC
dssAmQEKhdItpVgzNttFZlPR1HBcmRC4
=JU8D
-----END PGP SIGNATURE-----
--
-- Steve
You bring up some very good points and of course you are exactly
correct. OSSEC is NOT a HIPS and it would be a mistake to think Active
Response is an effective way to ensure things like SQL injection flaws
cannot be exploited. What I can say--based on my "real world"
experience--is that Active Response does a pretty good job of preventing
breaches. All but the most sophisticated attackers will do some sort of
enumeration and there are rules in place to detect that, which can also
initiate an Active Response. Of course, these work best when layered
with things like mod_security. Another good reason to layer security
protection measures is that it's not unheard of to put something in
"look-but-don't-touch" mode and forget about it when troubleshooting a
problem. With just one layer, like OSSEC, you have nothing if it gets
turned off. But with multiple layers, there is at least something in
place to protect you.
Exactly. The first injection connection can be bad. I have run systems
that were found to be vulnerable to SQL injection. OSSEC detected the
attack, but we were being hit from multiple IPs over a long time at a
low rate. Active response wouldn't have helped. We were able to use
OSSECs logs (and system logs) to figure out what scripts the attackers
were using. We took our systems off the internet, ran the same scans at
a high rate, and determined which parts of the system had not been
hardened against injection attacks. We then coded in a protection layer.
When we went back on the internet, OSSEC showed that the attacks
continued but without any success.
--
-- Steve
This is a great testimonial to how OSSEC can raise awareness. Without
something like OSSEC, most people are simply unaware of what is
happening. So this allowed you to focus on a particular area that was
problematic and fix it.
--
Sent from my iPhone
On Feb 5, 2011, at 11:52 AM, Michael Starks <ossec...@michaelstarks.com