Security Research
Showing results for 
Search instead for 
Do you mean 

150 ways to bypass ordinary WAF's but not ours, by design!

HP_SSR ‎08-09-2012 12:47 PM - edited ‎08-15-2012 01:40 PM

Wednesday, 8 August, 2012

 

At BH US 2012, Ivan Ristic showed off a new tool called IronBee which contains 100+ possible ways to bypass WAFs. As he focused on getting past the open-source ModSecurity WAF, other ordinary open source and commercial WAF's fall obviously prey to these attacks too. By design WAFs try to protect on the wire, lacking all the context they need to achieve proper protection. Check out where the HP Fortify RTA solution is looking for malicious behavior and where ordinary WAFs are trying to protect.



In essence, for every piece of data in the request, a WAF has to decide if it let the data go through or not WITHOUT a clue where the data will be used. Common attack patterns are easy to spot, but when the data is encoded, encrypted, obfuscated and so on, a WAF will quickly miss something and that is exactly what Ivan is pointing out. It is so hard to know how to treat the data when it's not known how the data will be used in the application itself. By design, HP Fortify RTA does not have to go through the hassle of decrypting, decoding, normalizing and so on. RTA waits until the data is used in the application itself and will then interfere if the data is used in an inappropriate way. There is so much more context inside the application!
 
Posted by mmadou at 1:26 AM

0 Kudos
About the Author

HP_SSR

Labels
Events
Each Month in 2016
Online
Software Expert Days - 2016
Join us online to talk directly with our Software experts during online Expert Days. Find information here about past, current, and upcoming Expert Da...
Read more
Sep 30
Seattle, WA
OpenStack Days Seattle
OpenStack Days Seattle, September 30, is the largest gathering of OpenStack users and prospective users in the Pacific Northwest region.
Read more
View all