当前位置:网站首页>Penetration test information collection - WAF identification
Penetration test information collection - WAF identification
2022-07-06 18:35:00 【Aspirin. two thousand and two】
List of articles
waf distinguish
Web Application protection system ( Also known as : Website application level intrusion prevention system . english :Web Application Firewall, abbreviation : WAF). Use an internationally accepted saying :Web The application firewall is designed by performing a series of actions against HTTP/HTTPS The security policy for Web An application that provides protection
WAF Difference from network firewall
Network firewall as access control device , The main work is OSI Model three 、 four layers , be based on IP Message detection . Just limit the port , Yes TCP The agreement is blocked . Its product design does not need to be understood HTTP conversation , It also determines that you can't understand Web Application languages such as HTML、SQL Language . therefore , It's impossible HTTP Communication for input verification or attack rule analysis . in the light of Web Malicious attacks on websites Most of them will be encapsulated as HTTP request , from 80 or 443 The port successfully passed the firewall detection .
waf species
- Hardware equipment ( Green League 、 Venus 、 Anheng 、 Know Chuangyu 、 Tianrongxin, etc )
- Software products ( Safe dog 、 Cloud lock 、D Shield, etc )
- Cloud based WAF( Alibaba cloud 、 Anheng 、 Know Chuangyu )
waf distinguish
wafwoof—https://github.com/EnableSecurity/wafw00f
see X-Powered-By: WAF Parameters
Tool use
The target site :https://www.safedog.cn/
Under folder `python main.py https://www.safedog.cn/
Know that the site uses waf after , It can be judged that the manufacturer is trying to bypass , And know that the site exists waf after , Pay attention when using scanning tools , Easy to ban ip
边栏推荐
- None of the strongest kings in the monitoring industry!
- Distiller les connaissances du modèle interactif! L'Université de technologie de Chine & meituan propose Virt, qui a à la fois l'efficacité du modèle à deux tours et la performance du modèle interacti
- 解读云原生技术
- 44 colleges and universities were selected! Publicity of distributed intelligent computing project list
- With the implementation of MapReduce job de emphasis, a variety of output folders
- Comparative examples of C language pointers *p++, * (p++), * ++p, * (++p), (*p) + +, +(*p)
- CRMEB 商城系统如何助力营销?
- Common - magic number 7
- 2022 Summer Project Training (III)
- Cobra 快速入门 - 专为命令行程序而生
猜你喜欢
Declval of template in generic programming
TOP命令详解
30 minutes to understand PCA principal component analysis
Breadth first traversal of graph
C language exchanges two numbers through pointers
简单易用的PDF转SVG程序
Splay
Penetration test information collection - CDN bypass
Shangsilicon Valley JUC high concurrency programming learning notes (3) multi thread lock
Ms-tct: INRIA & SBU proposed a multi-scale time transformer for motion detection. The effect is SOTA! Open source! (CVPR2022)...
随机推荐
Windows连接Linux上安装的Redis
STM32+HC05串口蓝牙设计简易的蓝牙音箱
Why does wechat use SQLite to save chat records?
Tree-LSTM的一些理解以及DGL代码实现
Brief description of SQL optimization problems
win10系统下插入U盘有声音提示却不显示盘符
Compilation Principle -- C language implementation of prediction table
使用cpolar建立一个商业网站(1)
Distill knowledge from the interaction model! China University of science and Technology & meituan proposed virt, which combines the efficiency of the two tower model and the performance of the intera
微信为什么使用 SQLite 保存聊天记录?
2022 Summer Project Training (III)
SQL优化问题的简述
【剑指 Offer】 60. n个骰子的点数
Comparative examples of C language pointers *p++, * (p++), * ++p, * (++p), (*p) + +, +(*p)
2022/02/12
[Matlab] Simulink 同一模块的输入输出的变量不能同名
Docker安装Redis
TOP命令详解
Windows connects redis installed on Linux
当保存参数使用结构体时必备的开发技巧方式