ASM Example: Detecting a Malicious HTTP Request
Request Example:
POST /login HTTP/1.1
Host: www.example.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Content-Length: 45
username=admin&password=' OR '1'='1
Analysis by ASM:
Method: POST is valid, but the body will be inspected.
Body: SQL Injection attempt (
' OR '1'='1
) is detected.Action: Request is blocked, and a violation is logged.
Last updated