Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • Home
  • SEARCH
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 83715
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 10, 20262026-05-10T21:49:01+00:00 2026-05-10T21:49:01+00:00

I’m working with SQL Server 2005 and Windows Server 2000 and wonder if there

  • 0

I’m working with SQL Server 2005 and Windows Server 2000 and wonder if there are any ‘automated’ ways of blocking SQL Injection attacks while I shore up my code.

Some have suggested that there are ways to:

  1. Put in some kind of ISAPI or HTTP module that filters request post and querystrings for injection-oriented symbols and fails the request before it even hits the application. Most of these solutions specific IIS 6 or higher. I’m running 5.
  2. Guarantee that each command object runs only a single SQL command at a time.

Any other ideas for my configuration?

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. 2026-05-10T21:49:01+00:00Added an answer on May 10, 2026 at 9:49 pm

    When I had a bunch of injection attack attempts on my server, I was worried that they were taking up unnecessary resources. I wrote (hacked!) an HttpModule in c# that would filter out most xss and sql injection attacks. The code is pasted below, along with the config section required to make a website use it. It should be put in a project and compiled to WebSecurityFilter.dll, which should then be referenced by the web project (or otherwise dropped in the bin directory).

    This will only work with asp.net, so hopefully your site is asp.net based (I did ask in a comment, but got no answer).

    Web config section (add it in the <httpModules> section of <system.web>:

      <add name='SecurityHttpModule' type='WebSecurityFilter.SecurityHttpModule, WebSecurityFilter' /> 

    Code for module (SecurityHttpModule.cs):

    using System; using System.Collections.Generic; using System.Text; using System.Web; using System.Text.RegularExpressions;  namespace WebSecurityFilter {     class SecurityHttpModule : IHttpModule     {         class RegexWithDesc : Regex         {             string _errorText;              public string ErrorText             {                 get { return _errorText; }             }              public RegexWithDesc(string regex, RegexOptions options, string errorText)                 :base(regex, options)             {                 _errorText = errorText;             }         }         /// <summary>         /// error text displayed when security violation is detected         /// </summary>         private string _errorhtml =         @'<!DOCTYPE html PUBLIC ''-//W3C//DTD XHTML 1.1//EN'' ''http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd''>' +         @'<html xmlns=''http://www.w3.org/1999/xhtml'' >' +         @'<body style=''background:black;''>' +         @'<table style=''width:100%'' >' +         @'<tr><td align=''center''>' +         @'<div style=''border:3px solid red;text-align:center;width:95%;color:red;padding:10px;text-decoration:blink;''>' +         @'SECURITY VIOLATION' +         @'<br/>' +         //@'<br/>' +         //@'go away' +         //@'<br/>' +         @'<br/>' +         @'{0}' +         @'<br/>' +         @'</div>' +         @'</td></tr>' +         @'</table>' +         @'</body>' +         @'</html>';          // regex for default checks         // http://www.securityfocus.com/infocus/1768         static RegexOptions _defaultRegexOptions = RegexOptions.Compiled | RegexOptions.IgnoreCase | RegexOptions.IgnorePatternWhitespace;          RegexWithDesc[] _regexCollection = new RegexWithDesc[]          {              new RegexWithDesc(@'((¼|<)[^\n]+(>|¾)*)|javascript|unescape', _defaultRegexOptions, 'XSS 1'), //3.3             // new RegexWithDesc(@'(\')|(\-\-)', _defaultRegexOptions, 'SQL 1'), //2.1             new RegexWithDesc(@'(=)[^\n]*(\'|(\-\-)|(;))', _defaultRegexOptions, 'SQL 2'),    //2.2             //new RegexWithDesc(@'\w*(\')(or)', _defaultRegexOptions, 'SQL 3'),  //2.3             new RegexWithDesc(@'(\')\s*(or|union|insert|delete|drop|update|create|(declare\s+@\w+))', _defaultRegexOptions, 'SQL 4'),   //2.4             new RegexWithDesc(@'exec(((\s|\+)+(s|x)p\w+)|(\s@))', _defaultRegexOptions, 'SQL 5')    //2.5         };         #region IHttpModule Members          public void Dispose()         {            // nothing to do         }          public void Init(HttpApplication context)         {             context.BeginRequest += new EventHandler(context_BeginRequest);         }          void context_BeginRequest(object sender, EventArgs e)         {             try             {                 List<string> toCheck = new List<string>();                 foreach (string key in HttpContext.Current.ApplicationInstance.Request.QueryString.AllKeys)                 {                     toCheck.Add(HttpContext.Current.ApplicationInstance.Request[key]);                 }                 foreach (string key in HttpContext.Current.ApplicationInstance.Request.Form.AllKeys)                 {                     toCheck.Add(HttpContext.Current.ApplicationInstance.Request.Form[key]);                 }                 foreach (RegexWithDesc regex in _regexCollection)                 {                     foreach (string param in toCheck)                     {                         string dp = HttpUtility.UrlDecode(param);                         if (regex.IsMatch(dp))                         {                             HttpContext.Current.ApplicationInstance.Response.Write(string.Format(_errorhtml, regex.ErrorText));                             HttpContext.Current.ApplicationInstance.CompleteRequest();                             return;                         }                     }                 }              }             catch (System.Threading.ThreadAbortException x)             {                 throw;             }             catch (Exception ex)             {                 HttpContext.Current.ApplicationInstance.Response.Write(string.Format(_errorhtml, 'Attack Vector Detected'));                 HttpContext.Current.ApplicationInstance.Response.Write(string.Format(_errorhtml, ex.GetType().ToString()));                 HttpContext.Current.ApplicationInstance.CompleteRequest();                 return;             }         }          #endregion     } } 

    Hopefully it all formatted okay…

    I’ll try to post a link to the complete project in a zip this evening.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Ask A Question

Stats

  • Questions 212k
  • Answers 212k
  • Best Answers 0
  • User 1
  • Popular
  • Answers
  • Editorial Team

    How to approach applying for a job at a company ...

    • 7 Answers
  • Editorial Team

    How to handle personal stress caused by utterly incompetent and ...

    • 5 Answers
  • Editorial Team

    What is a programmer’s life like?

    • 5 Answers
  • Editorial Team
    Editorial Team added an answer I've found a solution, using the code below. Basically, the… May 12, 2026 at 10:20 pm
  • Editorial Team
    Editorial Team added an answer Add a bool to FuncGuard that controls whether it should… May 12, 2026 at 10:20 pm
  • Editorial Team
    Editorial Team added an answer Commons FileUpload (1.2.1) is only semi-compatible with GAE. Only streaming… May 12, 2026 at 10:20 pm

Related Questions

I want use html5's new tag to play a wav file (currently only supported
I'm trying to decode HTML entries from here NYTimes.com and I cannot figure out
I ran into a problem. Wrote the following code snippet: teksti = teksti.Trim() teksti
In order to apply a triggered animation to all ToolTip s in my app,
I have a French site that I want to parse, but am running into

Trending Tags

analytics british company computer developers django employee employer english facebook french google interview javascript language life php programmer programs salary

Top Members

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.