mirror of
https://github.com/0xInfection/Awesome-WAF.git
synced 2025-02-05 09:15:18 -05:00
Added new WAF stuff
This commit is contained in:
parent
7151bf0772
commit
387b0a1446
130
README.md
130
README.md
@ -622,6 +622,22 @@ Wanna detect WAFs? Lets see how.
|
|||||||
</ul>
|
</ul>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
GreyWizard Firewall
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
<ul>
|
||||||
|
<li><b>Detectability: </b>Easy</li>
|
||||||
|
<li><b>Detection Methodology:</b></li>
|
||||||
|
<ul>
|
||||||
|
<li>Blocked response page content contains:<br><code>We've detected attempted attack or non standard traffic from your IP address</code> text.</li>
|
||||||
|
<li>Blocked response page title contains <code>Grey Wizard</code> keyword.</li>
|
||||||
|
<li>Response headers contain <code>greywizard</code> keyword.</li>
|
||||||
|
</ul>
|
||||||
|
</ul>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
HyperGuard Firewall
|
HyperGuard Firewall
|
||||||
@ -638,7 +654,7 @@ Wanna detect WAFs? Lets see how.
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
Imperva Incapsula
|
Imperva SecureSphere
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
<ul>
|
<ul>
|
||||||
@ -658,6 +674,40 @@ Wanna detect WAFs? Lets see how.
|
|||||||
</ul>
|
</ul>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
Immunify360 (CloudLinux Inc.)
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
<ul>
|
||||||
|
<li><b>Detectability: </b>Easy</li>
|
||||||
|
<li><b>Detection Methodology:</b></li>
|
||||||
|
<ul>
|
||||||
|
<li>Headers contain <code>imunify360</code> keyword.</li>
|
||||||
|
<li>Response page contains:</li>
|
||||||
|
<ul>
|
||||||
|
<li><code>Powered by Imunify360</code> text.</li>
|
||||||
|
<li><code>imunify360 preloader</code> if response type is JSON.</li>
|
||||||
|
</ul>
|
||||||
|
<li>Blocked response page contains <code>protected by Imunify360</code> text.</li>
|
||||||
|
</ul>
|
||||||
|
</ul>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
Janusec Application Gateway
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
<ul>
|
||||||
|
<li><b>Detectability: </b>Moderate</li>
|
||||||
|
<li><b>Detection Methodology:</b></li>
|
||||||
|
<ul>
|
||||||
|
<li>Blocked response page displays <code>Janusec Application Gateway</code> on malicious requests.</li>
|
||||||
|
</ul>
|
||||||
|
</ul>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
Jiasule Firewall
|
Jiasule Firewall
|
||||||
@ -681,7 +731,7 @@ Wanna detect WAFs? Lets see how.
|
|||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
<ul>
|
<ul>
|
||||||
<li><b>Detectability: </b>Easy</li>
|
<li><b>Detectability: </b>Moderate</li>
|
||||||
<li><b>Detection Methodology:</b></li>
|
<li><b>Detection Methodology:</b></li>
|
||||||
<ul>
|
<ul>
|
||||||
<li>Blocked response page displays <code>ks-waf-error.png</code> image (view source to see).</li>
|
<li>Blocked response page displays <code>ks-waf-error.png</code> image (view source to see).</li>
|
||||||
@ -814,6 +864,20 @@ Wanna detect WAFs? Lets see how.
|
|||||||
</ul>
|
</ul>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
PerimeterX Firewall
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
<ul>
|
||||||
|
<li><b>Detectability: </b>Easy</li>
|
||||||
|
<li><b>Detection Methodology:</b></li>
|
||||||
|
<ul>
|
||||||
|
<li>Blocked response page contains reference to<br> <code>https://www.perimeterx.com/whywasiblocked</code> URL.</li>
|
||||||
|
</ul>
|
||||||
|
</ul>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
Profense Firewall
|
Profense Firewall
|
||||||
@ -880,6 +944,24 @@ Wanna detect WAFs? Lets see how.
|
|||||||
</ul>
|
</ul>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
RSFirewall (RSJoomla)
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
<ul>
|
||||||
|
<li><b>Detectability: </b>Easy</li>
|
||||||
|
<li><b>Detection Methodology:</b></li>
|
||||||
|
<ul>
|
||||||
|
<li>Response page contains:</li>
|
||||||
|
<ul>
|
||||||
|
<li><code>COM_RSFIREWALL_403_FORBIDDEN</code> keyword.</li>
|
||||||
|
<li><code>COM_RSFIREWALL_EVENT</code> keyword.</li>
|
||||||
|
</ul>
|
||||||
|
</ul>
|
||||||
|
</ul>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
Safe3 Firewall
|
Safe3 Firewall
|
||||||
@ -945,6 +1027,20 @@ Wanna detect WAFs? Lets see how.
|
|||||||
</ul>
|
</ul>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
ShieldSecurity
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
<ul>
|
||||||
|
<li><b>Detectability: </b>Difficult</li>
|
||||||
|
<li><b>Detection Methodology:</b></li>
|
||||||
|
<ul>
|
||||||
|
<li>Blocked response page contains<br> <code>Something in the URL, Form or Cookie data wasn't appropriate</code> text.</li>
|
||||||
|
</ul>
|
||||||
|
</ul>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
SiteLock TrueShield
|
SiteLock TrueShield
|
||||||
@ -1107,6 +1203,26 @@ Wanna detect WAFs? Lets see how.
|
|||||||
</ul>
|
</ul>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
VirusDie Firewall
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
<ul>
|
||||||
|
<li><b>Detectability: </b>Easy</li>
|
||||||
|
<li><b>Detection Methodology:</b></li>
|
||||||
|
<ul>
|
||||||
|
<li>Response page contains:</li>
|
||||||
|
<ul>
|
||||||
|
<li><code>http://cdn.virusdie.ru/splash/firewallstop.png</code> picture.</li>
|
||||||
|
<li><code>copy; Virusdie.ru</p></code> text.</li>
|
||||||
|
<li>Response page title contains <code>Virusdie</code> keyword.</li>
|
||||||
|
<li>Page metadata contains <code>name="FW_BLOCK"</code> keyword</li>
|
||||||
|
</ul>
|
||||||
|
</ul>
|
||||||
|
</ul>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
WallArm (Nginx)
|
WallArm (Nginx)
|
||||||
@ -1223,12 +1339,12 @@ Wanna detect WAFs? Lets see how.
|
|||||||
Lets look at some methods of bypassing and evading WAFs.
|
Lets look at some methods of bypassing and evading WAFs.
|
||||||
|
|
||||||
### Fuzzing/Bruteforcing:
|
### Fuzzing/Bruteforcing:
|
||||||
__Method:__
|
#### Method:
|
||||||
Running a set of payloads against the URL/endpoint. Some nice fuzzing wordlists:
|
Running a set of payloads against the URL/endpoint. Some nice fuzzing wordlists:
|
||||||
- Wordlists specifically for fuzzing - [Seclists Fuzzing](https://github.com/danielmiessler/SecLists/tree/master/Fuzzing).
|
- Wordlists specifically for fuzzing - [Seclists Fuzzing](https://github.com/danielmiessler/SecLists/tree/master/Fuzzing).
|
||||||
- Can be done with automated tools like BurpSuite Intruder.
|
- Can be done with automated tools like BurpSuite Intruder.
|
||||||
|
|
||||||
__Technique:__
|
#### Technique:
|
||||||
|
|
||||||
- Load up your wordlist into Burp Intruder/custom fuzzer and start the bruteforce.
|
- Load up your wordlist into Burp Intruder/custom fuzzer and start the bruteforce.
|
||||||
- Record/log all responses from the different payloads fuzzed.
|
- Record/log all responses from the different payloads fuzzed.
|
||||||
@ -1241,12 +1357,12 @@ __Drawback:__
|
|||||||
- Many a times your IP will be blocked (temporarily/permanently).
|
- Many a times your IP will be blocked (temporarily/permanently).
|
||||||
|
|
||||||
### Regex-Reversing:
|
### Regex-Reversing:
|
||||||
__Method:__
|
#### Method:
|
||||||
- Most efficient method of bypassing WAFs.
|
- Most efficient method of bypassing WAFs.
|
||||||
- Some WAFs rely upon matching the attack payloads with the signatures in their databases.
|
- Some WAFs rely upon matching the attack payloads with the signatures in their databases.
|
||||||
- Payload matches the reg-ex the WAF triggers alarm.
|
- Payload matches the reg-ex the WAF triggers alarm.
|
||||||
|
|
||||||
__Techniques:__
|
#### Techniques:
|
||||||
|
|
||||||
##### • Step 1:
|
##### • Step 1:
|
||||||
__Keyword filer__: `and`, `or`, `union`
|
__Keyword filer__: `and`, `or`, `union`
|
||||||
@ -1289,7 +1405,7 @@ __Possible PHP Filter Code__: `preg_match('/(and|or|union|where|limit|group by|s
|
|||||||
|
|
||||||
##### • Step 7:
|
##### • Step 7:
|
||||||
__Keyword filer__: `and`, `or`, `union`, `where`, `limit`, `group by`, `select`, `'`, `hex`
|
__Keyword filer__: `and`, `or`, `union`, `where`, `limit`, `group by`, `select`, `'`, `hex`
|
||||||
Possible __Possible PHP Filter Code__: `preg_match('/(and|or|union|where|limit|group by|select|\'|hex)/i', $id)`
|
__Possible PHP Filter Code__: `preg_match('/(and|or|union|where|limit|group by|select|\'|hex)/i', $id)`
|
||||||
- __Filtered Injection__: `1 || substr(user,1,1) = unhex(61)`
|
- __Filtered Injection__: `1 || substr(user,1,1) = unhex(61)`
|
||||||
- __Bypassed Injection__: `1 || substr(user,1,1) = lower(conv(11,10,36))`
|
- __Bypassed Injection__: `1 || substr(user,1,1) = lower(conv(11,10,36))`
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user