SQL Injection information for IIS admins and developers

Tags: IIS, sql injection

The sql injection that has came up is affecting several ASP and ASP.NET applications.  Although the only way to prevent an attack is validate the code, hopefully these posts will provide some direction.  I included some links that discuss this more. 

Here’s a list of additional reading:

Building Secure ASP.NET Applications – Authentication, Authorization, and Secure Communication.

Improving Web Application Security – Threats and Countermeasures

This link talks about the issue in ASP/NET perspective:SQL Injection Attacks:

Sample code provided by Microsoft to validate SQL statements.

Log parser examples

http://youtube.com (search for sql injections)  This will show several videos posted on how people are doing this.

To do a quick find type from a command prompt

findstr “CAST(” ex080622.log > ss.txt   (change the log file date)

Note the ‘CAST’ is case senstative

Hope this helps,

Steve Schofield


  • Steven said


    First off, thanks the links are useful.

    Theoretically, are there any means to ensure whatever the team does, does not leave any room for SQL Injection attacks?

  • steve schofield said

    Hi Steven,

    In theory, once you plug a box on the internet, it's not secure, not matter what you do. All you can do is do the best you can and follow best security practices. Validating request variables and not trusting user input is probably the one thing that will help the most. It might cause some issues with your application, but if it's done with security in mind, it should be sufficient of a reason.

    Good luck,


  • rrobbins said

    This blog article has some good information on exactly how these attacks are being done: http://blogs.ittoolbox.com/c/programming/archives/a-look-at-aprils-mass-sql-injection-attack-for-aspnet-sql-server-environments-25388

Add a Comment