{"id":1206,"date":"2011-02-13T21:06:41","date_gmt":"2011-02-13T21:06:41","guid":{"rendered":"http:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/"},"modified":"2011-02-13T21:06:41","modified_gmt":"2011-02-13T21:06:41","slug":"seria-prezentacii-bypassing-web-application-firewalls-wafs","status":"publish","type":"post","link":"https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/","title":{"rendered":"S\u00e9ria prezent\u00e1ci\u00ed &#8211; Bypassing Web Application Firewalls (WAFs)"},"content":{"rendered":"<p>Pre\u010d\u00edtanie kn\u00edh <a href=\"http:\/\/www.amazon.com\/XSS-Attacks-Scripting-Exploits-Defense\/dp\/1597491543\/ref=sr_1_6?ie=UTF8&amp;s=books&amp;qid=1297627960&amp;sr=8-6\">XSS Attacks: Cross Site Scripting Exploits and Defense<\/a>, <a href=\"http:\/\/www.amazon.com\/Web-Application-Obfuscation-WAFs-Evasion-Filters-alert\/dp\/1597496049\">Web Application Obfuscation<\/a>\u00a0a osobn\u00e9 konzult\u00e1cie s autormi t\u00fdchto kn\u00edh na <a href=\"https:\/\/www.nethemba.com\/sk\/blog\/-\/blogs\/owasp-summit-2011-alebo-ked-sa-stretne-svetova-webappsec-spicka\">OWASP Summite 2011<\/a>\u00a0ma viedli k vytvoreniu zauj\u00edmavej technickej prezent\u00e1cie ako je mo\u017en\u00e9 obch\u00e1dza\u0165 s\u00fa\u010dasn\u00e9 webov\u00e9 aplika\u010dn\u00e9 firewally (WAFs) a tvori\u0165 &#8222;obfuskovan\u00fd&#8220; k\u00f3d.<\/p>\n<p><span class=\"Apple-style-span\">Uveden\u00fa predn\u00e1\u0161ku bude mo\u017en\u00e9 vidie\u0165 na\u017eivo:<\/span><\/p>\n<p><strong>17.2.2011 o 10:45 na konferencii\u00a0<a href=\"http:\/\/eventreg.oracle.com\/webapps\/events\/ns\/EventsDetail.jsp?p_eventId=125078&amp;src=7021954&amp;src=7021954&amp;Act=16\">Oracle Security Day v Bratislave<\/a><\/strong><\/p>\n<p><strong><span class=\"Apple-style-span\">22.2.2011 o 11:00 na konferencii\u00a0<a href=\"http:\/\/konference.iinfo.cz\/program-konference\/\">Trendy v internetov\u00e9 bezpe\u010dnosti v Prahe<\/a>\u00a0<\/span><\/strong><\/p>\n<p><strong>3.3.2011 o 19:00 v <a href=\"http:\/\/www.progressbar.sk\/blog\/-\/blogs\/bypassing-web-application-firewalls-wafs\">Progressbare v Bratislave<\/a><\/strong><\/p>\n<p><strong>29.3.2011 o 16:30 na <a href=\"http:\/\/new.dcs.fmph.uniba.sk\/index.php\/mit2\">MFF UK v Bratislave, miestnos\u0165 F1-108<\/a>\u00a0v r\u00e1mci predmetu Modern\u00e9 Informa\u010dn\u00e9 Technol\u00f3gie 2<\/strong><\/p>\n<p><strong>10.5.2011 na konferencii\u00a0<a href=\"http:\/\/spi.unob.cz\/\">Security and Protection of Information v Brne<\/a><\/strong><\/p>\n<p><span class=\"Apple-style-span\">Predn\u00e1\u0161ka bude prisp\u00f4soben\u00e1 cie\u013eov\u00e9mu publiku a mno\u017estvom \u010dasu na samotn\u00fa prezent\u00e1ciu &#8211; na Oracle Security Day bude viac mana\u017e\u00e9rsky orientovan\u00e1, naopak v Progressbare a MFF UK p\u00f4jde viac do h\u013abky.<\/span><\/p>\n<p><strong>Abstrakt uvedenej prezent\u00e1cie (v angli\u010dtine):<\/strong><\/p>\n<div id=\"cke_pastebin\">The goal of the presentation is to describe typical obfuscation attacks that allow attacker to bypass standard security measures such as various input filters, output encoding mechanisms used in web-based intrusion detection systems (IDS), intrusion prevention systems (IPS) and web application firewalls (WAFs). These attacks include different networking tricks, polymorphic shellcode and various code techniques.<\/div>\n<div id=\"cke_pastebin\">At the beginning we analyze and compare different HTML parsing and interpretation approaches used by most-common browsers that can lead to unique attack vectors.<\/div>\n<div id=\"cke_pastebin\">Javascript with full range of features represents another effective way that can be used to obfuscate or de-obfuscate code \u2013 some existing obfuscation tools are mentioned.<\/div>\n<div id=\"cke_pastebin\">We describe how it is possible to construct a \u201cnonalphanumeric Javascript code\u201d which does not contain alphabetic or numeric characters, but still can contain malicious executable code. CSS (Cascading Style Sheets) have also many features that can be abused in very interesting ways (for example CSS history hack used against weak CSRF tokens).<\/div>\n<div id=\"cke_pastebin\">However most of current applications are immune against SQL injection attacks, it is still possible to find many vulnerable applications. We focus on different fuzzy techniques (and useful open source SQL injection tools that implement them) which can be still used to bypass weak input validation controls.<\/div>\n<div id=\"cke_pastebin\">We conclude our presentation with demonstration of the most basic obfuscation techniques that can be successfully used to bypass traditional web application firewalls (WAFs).<\/div>\n<div id=\"cke_pastebin\">Finally we briefly describe current mitigation techniques that are recommended for an efficient malicious Javascript code analysis and sanitizing user input containing untrusted code.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Pre\u010d\u00edtanie kn\u00edh XSS Attacks: Cross Site Scripting Exploits and Defense, Web Application Obfuscation\u00a0a osobn\u00e9 konzult\u00e1cie s autormi t\u00fdchto kn\u00edh na OWASP Summite 2011\u00a0ma viedli k vytvoreniu zauj\u00edmavej technickej prezent\u00e1cie ako je mo\u017en\u00e9 obch\u00e1dza\u0165 s\u00fa\u010dasn\u00e9 webov\u00e9 aplika\u010dn\u00e9 firewally (WAFs) a tvori\u0165 &#8222;obfuskovan\u00fd&#8220; k\u00f3d. Uveden\u00fa predn\u00e1\u0161ku bude mo\u017en\u00e9 vidie\u0165 na\u017eivo: 17.2.2011 o 10:45 na konferencii\u00a0Oracle Security Day [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[12],"tags":[566,84],"class_list":["post-1206","post","type-post","status-publish","format-standard","hentry","category-uncategorized-cs","tag-bypassing-web-application-firewalls-cs","tag-pavol-luptak-cs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9ria prezent\u00e1ci\u00ed - Bypassing Web Application Firewalls (WAFs) - Nethemba<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9ria prezent\u00e1ci\u00ed - Bypassing Web Application Firewalls (WAFs) - Nethemba\" \/>\n<meta property=\"og:description\" content=\"Pre\u010d\u00edtanie kn\u00edh XSS Attacks: Cross Site Scripting Exploits and Defense, Web Application Obfuscation\u00a0a osobn\u00e9 konzult\u00e1cie s autormi t\u00fdchto kn\u00edh na OWASP Summite 2011\u00a0ma viedli k vytvoreniu zauj\u00edmavej technickej prezent\u00e1cie ako je mo\u017en\u00e9 obch\u00e1dza\u0165 s\u00fa\u010dasn\u00e9 webov\u00e9 aplika\u010dn\u00e9 firewally (WAFs) a tvori\u0165 &#8222;obfuskovan\u00fd&#8220; k\u00f3d. Uveden\u00fa predn\u00e1\u0161ku bude mo\u017en\u00e9 vidie\u0165 na\u017eivo: 17.2.2011 o 10:45 na konferencii\u00a0Oracle Security Day [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:published_time\" content=\"2011-02-13T21:06:41+00:00\" \/>\n<meta name=\"author\" content=\"Pavol Lupt\u00e1k\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nethemba\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Napsal(a)\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pavol Lupt\u00e1k\" \/>\n\t<meta name=\"twitter:label2\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/seria-prezentacii-bypassing-web-application-firewalls-wafs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/seria-prezentacii-bypassing-web-application-firewalls-wafs\\\/\"},\"author\":{\"name\":\"Pavol Lupt\u00e1k\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\"},\"headline\":\"S\u00e9ria prezent\u00e1ci\u00ed &#8211; Bypassing Web Application Firewalls (WAFs)\",\"datePublished\":\"2011-02-13T21:06:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/seria-prezentacii-bypassing-web-application-firewalls-wafs\\\/\"},\"wordCount\":422,\"commentCount\":0,\"keywords\":[\"bypassing web application firewalls\",\"pavol lupt\u00e1k\"],\"articleSection\":[\"Uncategorized @cs\"],\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nethemba.com\\\/cs\\\/seria-prezentacii-bypassing-web-application-firewalls-wafs\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/seria-prezentacii-bypassing-web-application-firewalls-wafs\\\/\",\"url\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/seria-prezentacii-bypassing-web-application-firewalls-wafs\\\/\",\"name\":\"S\u00e9ria prezent\u00e1ci\u00ed - Bypassing Web Application Firewalls (WAFs) - Nethemba\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\"},\"datePublished\":\"2011-02-13T21:06:41+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/seria-prezentacii-bypassing-web-application-firewalls-wafs\\\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nethemba.com\\\/cs\\\/seria-prezentacii-bypassing-web-application-firewalls-wafs\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/seria-prezentacii-bypassing-web-application-firewalls-wafs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/home-new-2025\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9ria prezent\u00e1ci\u00ed &#8211; Bypassing Web Application Firewalls (WAFs)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/nethemba.com\\\/de\\\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nethemba.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\",\"name\":\"Pavol Lupt\u00e1k\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"caption\":\"Pavol Lupt\u00e1k\"},\"sameAs\":[\"https:\\\/\\\/www.nethemba.com\\\/\"],\"url\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/author\\\/nethemba-admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9ria prezent\u00e1ci\u00ed - Bypassing Web Application Firewalls (WAFs) - Nethemba","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/","og_locale":"cs_CZ","og_type":"article","og_title":"S\u00e9ria prezent\u00e1ci\u00ed - Bypassing Web Application Firewalls (WAFs) - Nethemba","og_description":"Pre\u010d\u00edtanie kn\u00edh XSS Attacks: Cross Site Scripting Exploits and Defense, Web Application Obfuscation\u00a0a osobn\u00e9 konzult\u00e1cie s autormi t\u00fdchto kn\u00edh na OWASP Summite 2011\u00a0ma viedli k vytvoreniu zauj\u00edmavej technickej prezent\u00e1cie ako je mo\u017en\u00e9 obch\u00e1dza\u0165 s\u00fa\u010dasn\u00e9 webov\u00e9 aplika\u010dn\u00e9 firewally (WAFs) a tvori\u0165 &#8222;obfuskovan\u00fd&#8220; k\u00f3d. Uveden\u00fa predn\u00e1\u0161ku bude mo\u017en\u00e9 vidie\u0165 na\u017eivo: 17.2.2011 o 10:45 na konferencii\u00a0Oracle Security Day [&hellip;]","og_url":"https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_published_time":"2011-02-13T21:06:41+00:00","author":"Pavol Lupt\u00e1k","twitter_card":"summary_large_image","twitter_creator":"@nethemba","twitter_site":"@nethemba","twitter_misc":{"Napsal(a)":"Pavol Lupt\u00e1k","Odhadovan\u00e1 doba \u010dten\u00ed":"2 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/#article","isPartOf":{"@id":"https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/"},"author":{"name":"Pavol Lupt\u00e1k","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"headline":"S\u00e9ria prezent\u00e1ci\u00ed &#8211; Bypassing Web Application Firewalls (WAFs)","datePublished":"2011-02-13T21:06:41+00:00","mainEntityOfPage":{"@id":"https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/"},"wordCount":422,"commentCount":0,"keywords":["bypassing web application firewalls","pavol lupt\u00e1k"],"articleSection":["Uncategorized @cs"],"inLanguage":"cs","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/","url":"https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/","name":"S\u00e9ria prezent\u00e1ci\u00ed - Bypassing Web Application Firewalls (WAFs) - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"datePublished":"2011-02-13T21:06:41+00:00","author":{"@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"breadcrumb":{"@id":"https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/cs\/seria-prezentacii-bypassing-web-application-firewalls-wafs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/cs\/home-new-2025\/"},{"@type":"ListItem","position":2,"name":"S\u00e9ria prezent\u00e1ci\u00ed &#8211; Bypassing Web Application Firewalls (WAFs)"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs"},{"@type":"Person","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234","name":"Pavol Lupt\u00e1k","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","caption":"Pavol Lupt\u00e1k"},"sameAs":["https:\/\/www.nethemba.com\/"],"url":"https:\/\/nethemba.com\/cs\/author\/nethemba-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/posts\/1206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/comments?post=1206"}],"version-history":[{"count":0,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/posts\/1206\/revisions"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/media?parent=1206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/categories?post=1206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/tags?post=1206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}