当前位置:网站首页>Penetration test information collection - WAF identification
Penetration test information collection - WAF identification
2022-07-06 18:35:00 【Aspirin. two thousand and two】
List of articles
waf distinguish
Web Application protection system ( Also known as : Website application level intrusion prevention system . english :Web Application Firewall, abbreviation : WAF). Use an internationally accepted saying :Web The application firewall is designed by performing a series of actions against HTTP/HTTPS The security policy for Web An application that provides protection
WAF Difference from network firewall
Network firewall as access control device , The main work is OSI Model three 、 four layers , be based on IP Message detection . Just limit the port , Yes TCP The agreement is blocked . Its product design does not need to be understood HTTP conversation , It also determines that you can't understand Web Application languages such as HTML、SQL Language . therefore , It's impossible HTTP Communication for input verification or attack rule analysis . in the light of Web Malicious attacks on websites Most of them will be encapsulated as HTTP request , from 80 or 443 The port successfully passed the firewall detection .
waf species
- Hardware equipment ( Green League 、 Venus 、 Anheng 、 Know Chuangyu 、 Tianrongxin, etc )
- Software products ( Safe dog 、 Cloud lock 、D Shield, etc )
- Cloud based WAF( Alibaba cloud 、 Anheng 、 Know Chuangyu )
waf distinguish
wafwoof—https://github.com/EnableSecurity/wafw00f
see X-Powered-By: WAF Parameters
Tool use
The target site :https://www.safedog.cn/
Under folder `python main.py https://www.safedog.cn/
Know that the site uses waf after , It can be judged that the manufacturer is trying to bypass , And know that the site exists waf after , Pay attention when using scanning tools , Easy to ban ip
边栏推荐
- Ms-tct: INRIA & SBU proposed a multi-scale time transformer for motion detection. The effect is SOTA! Open source! (CVPR2022)...
- Recommend easy-to-use backstage management scaffolding, everyone open source
- Transport layer congestion control - slow start and congestion avoidance, fast retransmission, fast recovery
- Some understandings of tree LSTM and DGL code implementation
- 【Swoole系列2.1】先把Swoole跑起来
- win10系统下插入U盘有声音提示却不显示盘符
- [sword finger offer] 60 Points of N dice
- STM32+HC05串口蓝牙设计简易的蓝牙音箱
- Penetration test information collection - CDN bypass
- Stm32+hc05 serial port Bluetooth design simple Bluetooth speaker
猜你喜欢
Distill knowledge from the interaction model! China University of science and Technology & meituan proposed virt, which combines the efficiency of the two tower model and the performance of the intera
Implementation of queue
FMT open source self driving instrument | FMT middleware: a high real-time distributed log module Mlog
[.Net core] solution to error reporting due to too long request length
UDP protocol: simple because of good nature, it is inevitable to encounter "city can play"
Excellent open source fonts for programmers
递归的方式
使用cpolar建立一个商业网站(1)
小程序在产业互联网中的作用
重磅硬核 | 一文聊透对象在 JVM 中的内存布局,以及内存对齐和压缩指针的原理及应用
随机推荐
A method of sequentially loading Unity Resources
2019 Alibaba cluster dataset Usage Summary
Will openeuler last long
Recursive way
2019阿里集群数据集使用总结
Distill knowledge from the interaction model! China University of science and Technology & meituan proposed virt, which combines the efficiency of the two tower model and the performance of the intera
Afnetworking framework_ Upload file or image server
從交互模型中蒸餾知識!中科大&美團提出VIRT,兼具雙塔模型的效率和交互模型的性能,在文本匹配上實現性能和效率的平衡!...
Execution process of MySQL query request - underlying principle
Epoll () whether it involves wait queue analysis
celery最佳实践
[Matlab] Simulink 同一模块的输入输出的变量不能同名
Excel usage record
虚拟机VirtualBox和Vagrant安装
node の SQLite
【剑指 Offer】 60. n个骰子的点数
On time and parameter selection of asemi rectifier bridge db207
文档编辑之markdown语法(typora)
Interview shock 62: what are the precautions for group by?
Jerry is the custom background specified by the currently used dial enable [chapter]