Scenario 3.4: Unsanitized User Input#
Purpose#
Scan network traffic for un-sanitized user input.
Description#
This demonstration shows how decrypted traffic can be utilized to identify, collect, and report on potential attacks on network infrastructure. A SQL injection query was created through the browser over HTTPS against an HTTPS server for this scenario.
Procedure#
Use script 3.4 to generate traffic indicative of an attempted SQL injection attack.
Observe the detection of the traffic as indicative of potential SQL injection in NetScout’s Security Events Center.
Expected Outcome#
The traffic is detected as potentially indicative of a SQL injection attack by NetScout’s internal IDS.
Passive |
Active |
||||||
---|---|---|---|---|---|---|---|
Bounded Life-Time |
Exported Session Key |
Break & Inspect (Mira) |
Break and Inspect (F5) |
||||
Real-Time |
Post-Facto |
Real-Time |
Post-Facto |
Real-Time |
Post-Facto |
Real-Time |
Post-Facto |
Pass |
Pass |
Pass |
Pass |
Pass |
Pass |
Pass |
Pass |
Screenshots#

Detection of SQL injection attack.#