Alert Name: SOC127 – SQL Injection Detected
Severity: High
Event ID: 235
Event Time: Mar 07, 2024 – 12:51 PM
Category: Web Application Attack
Platform: LetsDefend SOC

This incident shows how someone on the internet tried to trick a website into giving out information it wasn’t supposed to. Instead of breaking in directly, the attacker sent specially crafted messages to the website to see how it would respond.

Even though the website replied with “everything is OK,” it was actually doing things it shouldn’t have in the background. This shows that systems can look normal on the surface while still being misused.

It also shows that attackers often use automated tools to test many tricks very quickly. Once they find a weak spot, they can start pulling information from the system.

The big takeaway is that websites need to be built carefully and constantly monitored, because small weaknesses can allow outsiders to access sensitive information without anyone noticing right away.


Alert Overview

A high-severity SQL injection alert was triggered after suspicious HTTP requests were detected originating from an external IP address targeting a web application.

SQL injection attacks allow attackers to manipulate backend database queries by injecting malicious SQL code through user-controllable input fields. In this case, multiple parameters were identified as vulnerable, allowing the attacker to interact with the database directly.

Key Event Details

FieldValue
Destination HostnameWebServer1000
Destination IP172.16.20.12
Source IP118.194.247.28
HTTP MethodGET
Vulnerable Parametersid, douj
HTTP Status200 (Success)
Response Size865 bytes
Tool Identifiedsqlmap 1.7.2
Device ActionAllowed

Threat Indicators Identified

  • Automated SQL injection tool usage (sqlmap)
  • Boolean-based SQL injection payloads
  • UNION-based SQL injection
  • Database enumeration attempts
  • Obfuscated SQL payloads using XML and character encoding
  • Dangerous function calls (xp_cmdshell)
  • Consistent successful HTTP responses

Attack Flow & Timeline

Time (UTC)Activity
12:50 PMPort scanning activity detected
12:51 PMInitial SQL injection payload observed
12:51 PMUNION-based data extraction attempts
12:53 PMBoolean-based SQL injection confirmation
12:53 PMContinued automated exploitation attempts

Payload Analysis (Examples)

UNION-Based SQL Injection

UNION ALL SELECT 1,NULL,'<script>alert("XSS")</script>',table_name FROM information_schema.tables

Boolean-Based SQL Injection

id=1 AND 9816=9452--

Obfuscated SQL Injection

CAST((CHR(113)||CHR(107)||CHR(107)||CHR(118)||CHR(113))||(SELECT (CASE WHEN (2574=2574) THEN 1 ELSE 0 END))::text AS NUMERIC)

Command Execution Attempt

EXEC xp_cmdshell('cat ../../../etc/passwd')

These payloads confirm active exploitation and post-exploitation testing.

Reputation Check

The source IP 118.194.247.28 was checked against multiple threat intelligence platforms:

  • VirusTotal
  • AbuseIPDB
  • Cisco Talos The IP address was reported for web attacks, scanning activity, and malicious behavior, further validating the malicious nature of the traffic.

Attack Assessment

  • SQL Injection Successful: Yes
  • Database Interaction: Confirmed
  • Database Enumeration: Observed
  • Command Execution: Attempted (not confirmed)
  • Planned Test: No
  • Traffic Direction: Internet → Company Network

This incident represents a successful compromise of the web application’s database layer.

Impact Assessment

  • Unauthorized database access: Yes
  • Data exposure: Possible
  • Web application integrity: Compromised
  • Risk of escalation: High
  • Business impact: High

Lessons Learned

  • Public-facing applications must be protected against SQL injection.
  • Input validation and prepared statements should be enforced.
  • Web Application Firewalls (WAF) must be enabled and tuned.
  • Dangerous database functions should be disabled.
  • Continuous monitoring of HTTP traffic is essential.
  • Regular security testing and code reviews are critical.

MITRE ATT&CK Mapping

TacticTechniqueID
ReconnaissanceActive ScanningT1595
Initial AccessExploit Public-Facing ApplicationT1190
DiscoveryDatabase EnumerationT1083
ExecutionCommand InjectionT1059

Artifacts Collected

ArtifactValue
Attacker IP118.194.247.28
Target HostWebServer1000
Toolsqlmap 1.7.2
HTTP Endpoints/, /index.php
Vulnerable Parametersid, douj

Sigma Rules

Final Verdict

True Positive – Successful SQL Injection Attack

The attacker successfully exploited a SQL injection vulnerability using automated tooling, gaining unauthorized interaction with the backend database. Although full system compromise was not confirmed, this incident represents a critical application security failure requiring immediate remediation.

Analyst Note

This case highlights how automated tools such as sqlmap can rapidly exploit poorly protected web applications. Even without confirmed operating system compromise, database-level access poses significant risk. Strong input validation, secure coding practices, and proactive web security monitoring are essential to prevent similar incidents.