Security Research
Showing results for 
Search instead for 
Do you mean 

150 ways to bypass ordinary WAF's but not ours, by design!

HP_SSR ‎08-09-2012 12:47 PM - edited ‎08-15-2012 01:40 PM

Wednesday, 8 August, 2012


At BH US 2012, Ivan Ristic showed off a new tool called IronBee which contains 100+ possible ways to bypass WAFs. As he focused on getting past the open-source ModSecurity WAF, other ordinary open source and commercial WAF's fall obviously prey to these attacks too. By design WAFs try to protect on the wire, lacking all the context they need to achieve proper protection. Check out where the HP Fortify RTA solution is looking for malicious behavior and where ordinary WAFs are trying to protect.

In essence, for every piece of data in the request, a WAF has to decide if it let the data go through or not WITHOUT a clue where the data will be used. Common attack patterns are easy to spot, but when the data is encoded, encrypted, obfuscated and so on, a WAF will quickly miss something and that is exactly what Ivan is pointing out. It is so hard to know how to treat the data when it's not known how the data will be used in the application itself. By design, HP Fortify RTA does not have to go through the hassle of decrypting, decoding, normalizing and so on. RTA waits until the data is used in the application itself and will then interfere if the data is used in an inappropriate way. There is so much more context inside the application!
Posted by mmadou at 1:26 AM

0 Kudos
About the Author


Nov 29 - Dec 1
Discover 2016 London
Learn how to thrive in a world of digital transformation at our biggest event of the year, Discover 2016 London, November 29 - December 1.
Read more
Each Month in 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during online Expert Days. Find information here about past, current, and upcoming Expert Da...
Read more
View all