The sql injection that has came up is affecting several ASP and ASP.NET applications. Although the only way to prevent an attack is validate the code, hopefully these posts will provide some direction. I included some links that discuss this more.
- http://forums.iis.net/p/1149068/1868206.aspx (Post by Bill Staples)
- http://forums.iis.net/t/1148917.aspx?PageIndex=1 (almost a million views, definitely worth reading)
Here’s a list of additional reading:
Building Secure ASP.NET Applications – Authentication, Authorization, and Secure Communication.
Improving Web Application Security – Threats and Countermeasures
This link talks about the issue in ASP/NET perspective:SQL Injection Attacks:
Sample code provided by Microsoft to validate SQL statements.
Log parser examples
http://youtube.com (search for sql injections) This will show several videos posted on how people are doing this.
To do a quick find type from a command prompt
findstr “CAST(” ex080622.log > ss.txt (change the log file date)
Note the ‘CAST’ is case senstative
Hope this helps,