Web Wiz - Green Windows Web Hosting

  New Posts New Posts RSS Feed - ASPROX
  FAQ FAQ  Forum Search   Events   Register Register  Login Login

ASPROX

 Post Reply Post Reply
Author
Nightrocker View Drop Down
Newbie
Newbie


Joined: 31 January 2008
Location: Tunis
Status: Offline
Points: 8
Post Options Post Options   Thanks (0) Thanks(0)   Quote Nightrocker Quote  Post ReplyReply Direct Link To This Post Topic: ASPROX
    Posted: 08 July 2008 at 11:05pm
Hi

I was victim of ASPROX (zanzana.net/forum) and all my database was flooded with a malicious scripts.

I think that the forum is not the cause of the injection, it is more my ASP programs in the other parts of the website, and I know that a big work has benn done by webwiz to secure the site.

But one of my forum members made me notice about some SQL injections vulnerabilities of the webwiz forum after having used this tool:

http://www.codeplex.com/Release/ProjectReleases.aspx?ProjectName=WSUS&ReleaseId=13436

So are there some ASPROX victims in here and what kind of filters have you written to protect yourselves?
Back to Top
WebWiz-Bruce View Drop Down
Admin Group
Admin Group
Avatar
Web Wiz Developer

Joined: 03 September 2001
Location: Bournemouth
Status: Offline
Points: 9844
Post Options Post Options   Thanks (0) Thanks(0)   Quote WebWiz-Bruce Quote  Post ReplyReply Direct Link To This Post Posted: 09 July 2008 at 9:45am
SQL Injections are becoming very common with automated bots launched from viruses on peoples computers firing off SQL Injections at every web site.

Luckily Web Wiz Forums is very well protected against this type of hacking as we see from log files 100's of failed SQL Injection attacks against this forum everyday from ASPROX.

This is what the SQLInjectionFinder that you link to will have picked up from your own log files, lots of attempts by ASPROX against Web Wiz Forums, however they WILL fail as Web Wiz Forums is very well protected against attacks by ASPROX and other viruses and hacking attacks.

To protect your own ASP applications from attack you need to parse ALL data from both querystring and form input, and not just for SQL Injection but also for Cross Site Scripting (XSS).

There are many sites if you search through google giving information on how to protect from these types of attacks.

At the very least you should check the datatype being passed, for intance if it is menat to be a number then use isNumeric(Request("userdata") to check that it is a number. For strings make sure you remove any single quotes (') by esacping them with Replace(userdata, "'", "''").

Other things you can do is strip out sentive words, HTML encode certain characters like [ ] ; etc.


Edited by WebWiz-Bruce - 09 July 2008 at 9:51am
Back to Top
 Post Reply Post Reply

Forum Jump Forum Permissions View Drop Down

Forum Software by Web Wiz Forums® version 12.08
Copyright ©2001-2026 Web Wiz Ltd.


Become a Fan on Facebook Follow us on X Connect with us on LinkedIn Web Wiz Blogs
About Web Wiz | Contact Web Wiz | Terms & Conditions | Cookies | Privacy Notice

Web Wiz is the trading name of Web Wiz Ltd. Company registration No. 05977755. Registered in England and Wales.
Registered office: Web Wiz Ltd, Unit 18, The Glenmore Centre, Fancy Road, Poole, Dorset, BH12 4FB, UK.

Prices exclude VAT at 20% unless otherwise stated. VAT No. GB988999105 - $, € prices shown as a guideline only.

Copyright ©2001-2026 Web Wiz Ltd. All rights reserved.