So why can't ordinary firewalls stop such attacks? Because such attacks are pretending to be normal traffic, there are no particularly large packets, and the address and content are not suspiciously mismatched, so no alerts are triggered. One of the most frightening examples is SQL injection. In this type of attack, hackers use one of your own HTML forms to query the database without authorization. Another threat is command execution. As long as the web application sends the command to the shell, the hacker can execute the command freely on the server.
Other attacks are simpler. For example, HTML comments often contain sensitive information, including login information left by inadvertent programmers. Thus, the attack on the application layer, from tampering with cookies to changing the hidden fields in the HTML form, depends entirely on the hacker's imagination. The good news, however, is that most of these attacks are completely preventable.
If combined, two complementary solutions provide a solid line of defense. First, use the app scanner to thoroughly scan your web app for vulnerabilities. Then, use the web application firewall to block the intrusion of criminals.
The application scanner basically launches a series of simulated attacks on your server and reports the results. KaVaDo ScanDo, Sanctum AppScan Audit, and SPI Dynamics are quite comprehensive in terms of detailing defects and recommending remedies. AppScan Audit is especially noteworthy because it has post-mortem checking capabilities that help programmers detect vulnerabilities as they code. However, none of these kits are comparable to a comprehensive review by security professionals.
Once you manage to block the vulnerability, the next step is to deploy a web application firewall. The way this type of firewall works is very interesting: figure out what the normal traffic going in and out of the app looks like, and then detect the abnormal traffic. To do this, the web application firewall must check the packets deeper than the normal firewall. Check Point is best known in this regard, but other vendors such as KaVaDo, NetContinuum, Sanctum and Teros are relatively small. Some of these firewalls use software, some use hardware, and some have both. But don't be fooled into thinking that this kind of firewall is plug and play, even if you use hardware. As with intrusion detection systems, you should also carefully adjust the web application firewall to reduce false positives and prevent attacks from sneaking into it.
Due to spam and increasingly rampant attacks, if you think that installing a firewall is all right and you can rest easy, you should think about how you should deal with it.
Careful users will suddenly find that the local connection of the tray in the lower right corner of
When setting up access sharing in the server, you will be prompted with the problem that the specifi
The spacing of desktop icons in WinXP system makes some users feel unsatisfied, so how to adjust the
In the process of optimizing WinXP system, many of our users may close some unnecessary services, bu
Microsoft official details: XPSP3 details
Windows XP Optimization Settings Network
How to find faulty accessories
The master's detailed explanation of the maintenance of the liquid crystal display
Experience using Windows to prevent viruses
Set Windows invisible password Secret login dual system
3 ways to lock the computer under XP
Ways to eliminate desktop text in Windows XP system
How to make Windows system hard disk acceleration skills
Introduce the important knowledge of the Internet firewall in detail.
Windows 7 memory footprint is the reason
Teach you to quickly customize the Windows XP system startup screen
Win10 system shutdown sound how to customize settings
Win7 constantly reminds IE11 to upgrade notifications. Open Don Juan mode
Win10 bios can't get in how to do
Deep Win7 official flagship system how to configure IIS
How to set win10 does not enter sleep after the cover
Windows 2000 Blue Screen of Death
Close Win10 window Snap function tips
Win7 right-click menu does not have a solution to run as an administrator