Getting New Actionable Insights by Analyzing Web Application Firewall Triggers
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore advanced techniques for post-processing ModSecurity Core Rule Set WAF triggers to generate actionable defenses in this 40-minute conference talk from AppSecEU 2014. Learn how to analyze collected malicious HTTP traffic to gain new insights on attackers and their techniques, enabling improved security controls and hardened defenses. Dive into detailed case studies based on real traffic from Akamai's Cloud Security Intelligence platform, including examples of remote file inclusion attacks and methods for generating signatures to enhance detection capabilities. Discover how to leverage attack "anchors" for enriching other security controls, monitoring URL and domain reputation, and correlating distributed attack campaigns. Gain valuable knowledge on improving web application security through innovative analysis of WAF data.
Syllabus
Introduction
Story
Questions
Another Question
Question Answers
What can I learn
What can I do
Today Im going to talk about
Three Methods
Objectives
IP Reputation
Adolf Signature
File Upload
Web Hive
BotNet Mitigation
Similarities between attackers
Excessive access
Analysis
Enhanced Executive Report
Case Study
Webhive
Actionable Insights
Analysis Reporting
Querying the database
Taught by
OWASP Foundation
Related Courses
Security Event Triage: Revealing Attacker Methodology in Web Application EventsPluralsight Securing Applications in Microsoft Azure
Pluralsight AWS Administration: Security Fundamentals
LinkedIn Learning AWS Certified Solutions Architect - Associate (SAA-C02): 7 Application Deployment
LinkedIn Learning Azure Administration: Load Balancers and Application Gateways
LinkedIn Learning