YoVDO

Command Injection in F5 iRules

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Command Injection Courses Unit Testing Courses Web Application Security Courses Network Engineering Courses

Course Description

Overview

Explore command injection vulnerabilities in F5 iRules through this 49-minute Black Hat conference talk. Dive into the world of BigIP F5 products, widely used by large corporations and governments for reverse proxy and web traffic routing. Learn about iRules, a subset of rules written in TCL-based language, and understand its syntax, structure, and potential security risks. Examine script examples, server headers, and HTTP server configurations. Discover exploitation techniques, including table syntax manipulation and TMSH attack chains. Gain insights into unit testing for iRules and understand the importance of secure coding practices in high-performance network environments. Conclude with a summary of key takeaways and participate in a Q&A session to deepen your understanding of iRules security.

Syllabus

Introduction
Christopher
What is iRules
iRules the language
Script example
Server header
HTTP server
Syntax
Decalogue
Quotes
Code Example
Exploit
Demo
Table and Table
Table Syntax
Example
Request
TMSH
Attack Chain
Unit Testing
Summary
Questions


Taught by

Black Hat

Related Courses

Ruby on Rails: An Introduction
Johns Hopkins University via Coursera
Internet of Things Capstone: Build a Mobile Surveillance System
University of California, San Diego via Coursera
Engineering Maintainable Android Apps
Vanderbilt University via Coursera
Orientação a Objetos com Java
Instituto Tecnológico de Aeronáutica via Coursera
TDD – Desenvolvimento de Software Guiado por Testes
Instituto Tecnológico de Aeronáutica via Coursera