egrizzly said: Thanks for the input si20. I'm talking about it from a blue team/analyst perspective. Yeah, I'm 100% up to speed with the part about identifying the SQL statements being entered into the applications however how do you know that such statements where successful in what they attempted to query? I say this because anybody can enter SELECT, WHERE, etc into an input field but that does not mean any of it will get through.
iBrokeIT said: DB log review
egrizzly said: iBrokeIT said: DB log review I know you determine this from logs. What specifically are you looking for in the logs?
denisehilton said: The logs will tell you obviously. That's why Syslog servers and SIEM solutions are so useful. If there's any unauthorized access the SIEM will generate an alert.
egrizzly said: Hi JD. Yeah, but you're saying all this from a pen-testers point of view. I'm a SOC analyst. The furthest I can get with these attacks is being able to identify the SQL commands (e.g. SELECT, WHERE, etc). However after that their's no way to tell if the attack was successful (or if the system is vulnerable) just by looking at the logs.