Web Application Firewall Workshop

Retour à la liste des conférenciers et sessions
Écoutez la diffusion
Web Application Firewalls (WAF) are a reality in several organizations to defend edge services. In this workshop, you will learn to bypass such appliance in hand-on exercises.

Web Application Firewalls usage is controversial in the field of application security. Some consider them useless since they are imperfect. Others consider them an interesting ally for virtual patching and for defense in depth. Beyond this debate, firewalls are a reality in several organizations to defend edge services.

Testers may find the presence of such protection to be a drag on their security assessment. As these firewalls cannot always be disabled for testing, it is important to be able to quickly assess whether a circumvention method is possible. We have designed a workshop featuring different scenarios where a firewall is used to block certain attacks or features.

The workshop will consist of 4 main bypass categories: - Encoding (URL, Unicode, case mapping) - SQLi bypass (for mod_security and libinjection) - Switching protocol (WebSocket, H2C) - Syntax alternatives for table names, keywords and URLs.

For each of the exercises, an in-depth explanation of the technique will be discussed. Then a demonstration application will be available to participants to apply their new knowledge.

Participants should prepare by:

The participants should have the following software to save some time. - Docker - Burp Suite Pro / OWASP ZAP - Python

Participants must have the following equipment:

The participants should have the following software to save some time. - Docker - Burp Suite Pro / OWASP ZAP - Python