Showing 25 results for: 2010 ×ModSecurity ×

Announcing Release of OWASP ModSecurity Core Rule Set v2.1.0

I am pleased to announce the release of the OWASP ModSecurity Core Rule Set (CRS) v2.1.0. This is a significant update as we have added many new capabilities. CHANGE LOG - -------------------------- Version 2.1.0 - 12/29/2010 -------------------------- Improvements: - Added...

Updated ModSecurity Demonstrations

ModSecurity Demonstration Projects We have a number of different ModSecurity Demonstration projects hosted on the ModSecurity site. ModSecurity/PHPIDS Evasion Testing Demo The ModSecurity Demo is a joint effort between the ModSecurity and PHPIDS project teams to allow users to test...

Announcing Release of CRS v2.0.9

Greetings everyone, I am pleased to announce the release of the OWASP ModSecurity Core Rule Set (CRS) v2.0.9. The most significant change is that users can now easily toggle between Traditional or Anomaly Scoring Detection modes. CHANGE LOG - --------------------------...

ModSecurity 2.5.13 release candidate

Already available a release candidate of 2.5.13 ModSecurity into svn repository (branch 2.5.x). There are some improvements, new features and bug fixes like : New features: * Added new setvar Lua API to be used into Lua scripts * Added...

Detecting Malice with ModSecurity: IP Forensics

This week's installment of Detecting Malice with ModSecurity will discuss the value of obtaining data about client IP Addresses. IP Forensic Section of Robert "Rsnake" Hansen's book "Detecting Malice" - Whenever someone connects to your server you get their IP...

ModSecurity Life cycle

We are proud to announce the new release 2.5.13 is under development and will be released next month! it will be the last release of 2.5 series and will fix some important issues reported by the community. Also we decided...

Advanced Topic of the Week: Request Header Tagging

Request Header Tagging Wouldn't it be cool if your WAF could share its data with the application it is protecting? This concept is similar to anti-SPAM SMTP apps that will add additional mime headers to emails providing the SPAM detection...

ModSecurity User Survey Results Released

As a result of the acquisition of Breach Security (and thus ModSecurity) by Trustwave, we thought that it was a good time to run another User Survey to get a better understanding of how the community is using ModSecurity and,...

Welcome Aboard Breno Silva

I am excited to announce that Breno Silva has joined Trustwave's SpiderLabs Research Team where he will be serving as the new ModSecurity Development Lead. Breno has recently been working on the OISF team to develop Suricata. Here is a...

Advanced Topic of the Week: Validating SessionIDs

This week's topic discusses how to validate application SessionIDs submitted by clients. Reference Manual Initializing the SESSION collection with the setsid action. setsid Description: Special-purpose action that initialises the SESSION collection. Action Group: Non-disruptive Example: # Initialise session variables using...

WASC WHID Bi-Annual Report for 2010

The Web Hacking Incident Database (WHID) is a project dedicated to maintaining a record of web application-related security incidents. WHID's purpose is to serve as a tool for raising awareness of web application security problems and to provide information for...

Advanced Topic of the Week: Real-time Blacklist Lookups

This week's feature is the effective use of Real-time Blacklist lookups (@rbl). Reference Manual rbl Description: Look up the parameter in the RBL given as parameter. Parameter can be an IPv4 address, or a hostname. Example: SecRule REMOTE_ADDR "@rbl sc.surbl.org"...

Advanced Topic of the Week: Transformation Functions

This week's feature is the effective use of Transformation functions. Reference Manual This excerpt is taken from the updated Reference Manual section of Ivan Ristic's book ModSecurity Handbook. Transformation functions are used to alter input data before it is used...