598d29f811
chore: change tags, date, modified fields to comply with v2 of the Sigma spec. chore: update the related type from `obsoletes` to `obsolete`. chore: update local json schema to the latest version.
30 lines
846 B
YAML
30 lines
846 B
YAML
title: Suspicious SQL Query
|
|
id: d84c0ded-edd7-4123-80ed-348bb3ccc4d5
|
|
status: test
|
|
description: Detects suspicious SQL query keywrods that are often used during recon, exfiltration or destructive activities. Such as dropping tables and selecting wildcard fields
|
|
author: '@juju4'
|
|
date: 2022-12-27
|
|
references:
|
|
- https://github.com/sqlmapproject/sqlmap
|
|
tags:
|
|
- attack.exfiltration
|
|
- attack.initial-access
|
|
- attack.privilege-escalation
|
|
- attack.t1190
|
|
- attack.t1505.001
|
|
logsource:
|
|
category: database
|
|
definition: 'Requirements: Must be able to log the SQL queries'
|
|
detection:
|
|
keywords:
|
|
- 'drop'
|
|
- 'truncate'
|
|
- 'dump'
|
|
- 'select \*'
|
|
condition: keywords
|
|
falsepositives:
|
|
- Inventory and monitoring activity
|
|
- Vulnerability scanners
|
|
- Legitimate applications
|
|
level: medium
|