2 new waf fingerprints

This commit is contained in:
0xInfection 2019-02-26 21:16:40 +05:30 committed by root
parent a87c607cf1
commit f4022e7f74

View File

@ -135,7 +135,7 @@ Wanna detect WAFs? Lets see how.
<li>Blocked response page contains:</li>
<ul>
<li><code>Sorry, your request has been blocked as it may cause potential threats to the server's security</code> text snippet.</li>
<li>Reference to <code>error.aliyun.com</code> site.</li>
<li>Reference to <code>errors.aliyun.com</code> site.</li>
</ul>
</ul>
</ul>
@ -347,6 +347,20 @@ Wanna detect WAFs? Lets see how.
</ul>
</td>
</tr>
<tr>
<td>
CDN NS Application Gateway
</td>
<td>
<ul>
<li><b>Detectability: </b>Easy</li>
<li><b>Detection Methodology:</b></li>
<ul>
<li>Blocked response page contains <code>by CdnNsWAF Application Gateway</code> text snippet.</li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>
ChinaCache Firewall
@ -364,7 +378,7 @@ Wanna detect WAFs? Lets see how.
</tr>
<tr>
<td>
ACE XML Gateway (Cisco)
Cisco ACE XML Gateway
</td>
<td>
<ul>
@ -927,6 +941,20 @@ Wanna detect WAFs? Lets see how.
</ul>
</td>
</tr>
<tr>
<td>
Proventia (IBM)
</td>
<td>
<ul>
<li><b>Detectability: </b>Difficult</li>
<li><b>Detection Methodology:</b></li>
<ul>
<li>Blocked response page might contain to <code>request does not match Proventia rules</code> text snippet.</li>
</ul>
</ul>
</td>
</tr>
<tr>
<td>
Radware Appwall