Um sicherzustellen, dass das IDS richtig funktioniert habe ich folgende Anfrage an einen Web-Server (Port 80 HTTP) geschickt: http://[external]/index.php?username=-1 union select 1,2,table_name FROM information_schema.tables-- -Nun habe ich gehofft, dass die Regel sid=2017808 (ET WEB_SERVER Possible MySQL SQLi Attempt...) anschlägt. Die Regel ist aktiviert.
alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET WEB_SERVER Possible MySQL SQLi Attempt Information Schema Access"; flow:to_server,established; content:"information_schema"; nocase; http_uri; reference:url,pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet; classtype:web-application-attack; sid:2017808; rev:2; metadata:created_at 2013_12_06, updated_at 2013_12_06;)
du brauchst doch nur unter rules danach zu suchen. Details: http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheetQuotealert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET WEB_SERVER Possible MySQL SQLi Attempt Information Schema Access"; flow:to_server,established; content:"information_schema"; nocase; http_uri; reference:url,pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet; classtype:web-application-attack; sid:2017808; rev:2; metadata:created_at 2013_12_06, updated_at 2013_12_06;)https://rules.emergingthreats.net/open/suricata/rules/emerging-web_server.rules
content:"information_schema";
$EXTERNAL_NET any -> $HOME_NET any oder $EXTERNAL_NET any -> $HTTP_SERVERS any
flow:to_server,established;