Web application firewalls identification in MitB-model
Prikladnaya Diskretnaya Matematika. Supplement, no. 9 (2016), pp. 92-93
Cet article a éte moissonné depuis la source Math-Net.Ru
The existing methods of web application firewalls identification in “Man in the Browser” attacker model is considered. An implementation of the methods as a module for BeEF (Browser Exploitation Framework) is proposed.
Keywords:
application security, web application firewall, fingerprinting.
@article{PDMA_2016_9_a34,
author = {D. N. Kolegov and P. A. Lineytsev},
title = {Web application firewalls identification in {MitB-model}},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {92--93},
year = {2016},
number = {9},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2016_9_a34/}
}
D. N. Kolegov; P. A. Lineytsev. Web application firewalls identification in MitB-model. Prikladnaya Diskretnaya Matematika. Supplement, no. 9 (2016), pp. 92-93. http://geodesic.mathdoc.fr/item/PDMA_2016_9_a34/
[1] Alkorn W., Frichot C., Orru M., The Browser Hacker's Handbook, John Wiley Sons, Indianapolis, 2014, 648 pp.
[2] The Browser Exploitation Framework Project, http://beefproject.com/
[3] The WAFW00F project, https://github.com/EnableSecurity/wafw00f
[4] The sqlmap project, http://sqlmap.org/