Back to Browse

SA - SOC127-235 - SQL Injection Detected

274 views
Aug 16, 2025
36:48

Continuing with the Security Analyst Path, we tackle an Medium alert for an SQL Injection Detection event. Was this actual exploitation or just a false alarm? EventID: 235 Event Time: Mar, 07, 2024, 12:51 PM Rule: SOC127 - SQL Injection Detected Level: Security Analyst Source Address: 118.194.247.28 Destination Address: 172.16.20.12 Destination Hostname: WebServer1000 Request URL: GET /?douj=3034%20AND%201%3D1%20UNION%20ALL%20SELECT%201%2CNULL%2C%27%3Cscript%3Ealert%28%22XSS%22%29%3C%2Fscript%3E%27%2Ctable_name%20FROM%20information_schema.tables%20WHERE%202%3E1--%2F%2A%2A%2F%3B%20EXEC%20xp_cmdshell%28%27cat%20..%2F..%2F..%2Fetc%2Fpasswd%27%29%23 HTTP/1.1 200 865 Device Action: Allowed Items in question: https://www.virustotal.com/gui/ip-address/118.194.247.28 https://talosintelligence.com/reputation_center/lookup?search=118.194.247.28 https://otx.alienvault.com/indicator/ip/118.194.247.28 https://www.abuseipdb.com/check/118.194.247.28 NOTES: https://app.letsdefend.io/training/lesson_detail/introduction-web-attacks-101 https://portswigger.net/web-security/sql-injection https://owasp.org/www-community/attacks/SQL_Injection

Download

0 formats

No download links available.

SA - SOC127-235 - SQL Injection Detected | NatokHD