AbbySec

My digital playground – where hacking meets learning.

View on GitHub
28 February 2026

SOC165 – SQL Injection Attempt Against Internal Web Server

by

🧠 Summary

This investigation began as a Possible SQL Injection Payload Detected (SOC165) alert.

Initial firewall logs revealed multiple SQL injection payload variations targeting the /search endpoint of an internal web server.

Further HTTP response analysis and device command history investigation confirmed that although the injection attempts reached the backend, no successful exploitation or compromise occurred.

The case was classified as:

True Positive – Unsuccessful SQL Injection Attempt


🚨 Alert Overview


🌐 Traffic Direction

Direction:

Internet → Company Network

This confirms the attack originated from outside the organization.


🔎 Step 1 – Payload Decoding & Analysis

🔐 Encoded Request

/search/?q=%22%20OR%201%20%3D%201%20--%20-

🔓 Decoded Payload

/search/?q=" OR 1 = 1 --

This is a classic Boolean-based SQL injection payload.


🔁 Additional Payload Variations Observed

/search/?q=' /search/?q=' OR '1'='1 /search/?q=' OR ''=' /search/?q=' ORDER BY 3--+

These variations indicate structured SQL enumeration behavior:

This is consistent with automated SQL injection tools or manual exploitation attempts.


🖼 Example of Decoded URL (Using Online URL Decoder)

Example Decoded URL


🛰 Step 2 – IP Ownership & Reputation Check

Source IP: 167.99.169.17

💻 IP Details Check

IP Details

🖼 VirusTotal Check

VT RESULT

Cloud VPS addresses are commonly abused for reconnaissance and automated attacks.


📊 Step 3 – HTTP Response Analysis

Request Type HTTP Status Response Size (Bytes)
Injection Attempts 500 948
Normal Homepage 200 3547

All malicious payloads resulted in:

HTTP 500 – Internal Server Error

This suggests the backend query failed but did not return data.

No abnormal large responses were observed, which reduces likelihood of data extraction.


🖥 Step 4 – Device Command History Review

Device CLI logs were examined to identify possible command execution or compromise.

Observed commands:

cd web-root docker-compose -f docker-compose-deploy.yml build docker-compose -f docker-compose-deploy.yml up

These were legitimate deployment activities unrelated to the attack timeline.

No evidence of:


🎯 Final Analysis

Attack Type:

SQL Injection (Boolean-based + Column Enumeration)

Was the Attack Successful?

❌ No

Evidence Supporting This Conclusion:


📂 Artifacts Collected


🚫 Tier 2 Escalation

Not required.

Reason:


🏁 Case Outcome

This was a confirmed SQL Injection attempt targeting an internal web server.

Although the payloads reached the application layer, exploitation was unsuccessful.

The case was closed as:

True Positive – No Impact


🔥 Skills Demonstrated


More blue team investigations coming soon 🚀

tags: