CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
News Releases

Trustwave to Deliver Briefing at OWASP AppSec Europe 2009

Experts to Demonstrate Vulnerabilities in Commercial Web Application Firewalls

CHICAGO (May 12, 2009) - Trustwave, the leading provider of on-demand data security and payment card industry compliance management solutions to businesses and organizations throughout the world, will deliver a briefing at OWASP AppSec Europe, 13-14 May, 2009. Wendel Henrique, a member of SpiderLabs, the advanced security team at Trustwave responsible for incident response and forensics, ethical hacking and application security, will conduct the briefing along with Sandro Gauci of EnableSecurity.

The presentation will examine the security effectiveness of Web Application Firewalls (WAFs), the next generation product that protects Web sites from application level attacks such as Cross Site Scripting and SQL injection. WAFs inspect every request sent and received from a Web Server, parsing, decoding and analyzing all requests for potential attacks. Depending on the set of rules applied by the WAF, it will either log an attack or block it. WAFs are either software or hardware and are typically installed in front of a Web server in an effort to try and shield it from incoming attacks.

Through continuous research, Henrique and Gauci have determined that many commonly used Web Application Firewalls are themselves vulnerable to hacking. The result of studying different WAF products, methodologies and technologies, has created generic and specific techniques to detect, identify, bypass and even exploit these systems.

Using this research, Henrique and Gauci created "WafW00f," a tool that applies their research and automates the process of identifying WAFs. WafW00f can precisely identify 20 different brands of WAFs and detect if they are in reactive mode. A second tool they've created, "WafFun," allows them to bypass and exploit WAF systems. Together, their tools allow them to identify the traffic blocked by the WAF and modify their attacks in a way that is completely blind to the WAF system, enabling the exploitation of the Web-facing application.

Consequently, if the WAF system is circumvented then the Web application is returned to a state prior to the installation of the WAF. If an attacker is able to exploit a flaw in the WAF, the attacker can take complete control of the system, resulting in disabled rules, copying of local files, and using the WAF system to launch further attacks.

During their presentation, Henrique and Gauci will use WafW00f, WafFun and other original tools to detect, bypass and exploit commercial WAF systems, showing first-hand the vulnerabilities associated with these systems.

"In theory, Web Application Firewalls should work transparently, preventing an end user or attacker to know they are in place, but improper configuration leaves signs that allow detection and identification of these systems," says Robert J. McCullen, chairman and CEO of Trustwave. "With the increase in Web application attacks, organizations have to be certain that their environment is secure and cannot leave any vulnerabilities, known or unknown, for attackers to exploit."

"Web application firewalls try to protect poorly written applications from attacks proving highly ineffective if the WAF fails or can be detected by the attacker," says Nicholas Percoco, vice president and head of SpiderLabs for Trustwave. "Application code reviews or penetration tests should always be performed to identify the problems outright. A WAF can be used to buy time for developers while fixes are implemented, but should never be seen as the final destination in a secure development lifecycle."

About Trustwave
Trustwave is a leading provider of on-demand and subscription-based information security and payment card industry compliance management solutions to businesses and government entities throughout the world. For organizations faced with today's challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its flagship TrustKeeper® compliance management software and other proprietary security solutions including SIEM , WAF , EV SSL certificates  and secure digital certificates . Trustwave has helped hundreds of thousands of organizations-ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers-manage compliance and secure their network infrastructures, data communications and critical information assets. Trustwave is headquartered in Chicago with offices throughout North America, South America, Europe, Africa, Asia and Australia. For more information, visit https://www.trustwave.com/en-us/.

Latest News Releases

Trustwave Announces Strategic Global Partnership with Telarus

Chicago – April 23, 2024 – Trustwave, a global cybersecurity and managed security services leader, today announced a strategic partnership with Telarus, a leading Technology Services Distributor...

Read More

Trustwave Named a Major Player in New IDC MarketScape on Worldwide Cybersecurity Consulting Services

CHICAGO – April 3, 2024 – Trustwave, a leading cybersecurity and managed security services provider, was named a Major Player in the IDC MarketScape: Worldwide Cybersecurity Consulting Services 2024...

Read More

Trustwave Adds Threat Intelligence as a Service to its Offensive Security Offering Portfolio

CHICAGO – April 2, 2024 – Trustwave , a global cybersecurity and managed security services leader, today announced the launch of Trustwave Threat Intelligence as a Service (TIaaS). Trustwave TIaaS...

Read More