What is trying to do NV32ts and its SQL injection?

Recently, I get a few attacks on my site using the NV32ts User-Agent.

All of them are some variants of the following injection attacks against the querystring variable (where 99999 represents the actual value for the request, the attack is added to the value):

(For convenience, I have urldecoded the following attacks)

999999 And char(124)+(Select Cast(Count(1) as varchar(8000))+char(124) From [sysobjects] Where 1=1)>0

or

999999' And char(124)+(Select Cast(Count(1) as varchar(8000))+char(124) From [sysobjects] Where 1=1)>0 and ''='

or

999999' And char(124)+(Select Cast(Count(1) as varchar(8000))+char(124) From [sysobjects] Where 1=1)>0 and ''='

I believe sysobjects has something to do with the main Sql Server database, but I can’t understand what they are trying to accomplish.

Edit: I now saw these same things with two different user agents:

  • NV32ts
  • Mozilla/4.0 (; MSIE 7.0; Windows NT 5.1; InfoPath.1;.NET CLR 1.1.4322;.NET CLR 2.0.50727;.NET CLR 3.0.04506.30;.NET CLR 3.0.04506.648; CLR 3.5.21022; WWTClient2)
+5
3

, 100%, :

  • . script -, , sysobjects sql. ( ) . , , script . javascript, (varchar, nvarchar, char, nchar, text) db. , .
  • , true, , . , sysobjects . : And, Or.
+5

, , SQL Injection.

Char (124) | . , (, 1428 |). 0 > 0 , | 1428 | int.

, SQL Injection, ( ). , , SQL- . , , ( , , , , ).

SQL- , , , . , SQL-.

, .

, , !

+5

HP , , , ( ) SQL Injection, sdrawlr. :

0
source

All Articles