{"id":4112,"date":"2016-03-22T03:14:43","date_gmt":"2016-03-21T19:14:43","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4112"},"modified":"2016-03-22T03:15:48","modified_gmt":"2016-03-21T19:15:48","slug":"naxsi-open-source-waf-nginx","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/03\/naxsi-open-source-waf-nginx\/","title":{"rendered":"NAXSI – Open-Source WAF For Nginx"},"content":{"rendered":"

NAXSI is an open-source WAF for Nginx (W<\/strong>eb A<\/strong>pplication F<\/strong>irewall) which by default can block 99% of known patterns involved in website vulnerabilities. NAXSI means N<\/strong>ginx A<\/strong>nti X<\/strong>SS & S<\/strong>QL I<\/strong>njection<\/p>\n

\"NAXSI<\/p>\n

Technically, it is a third party Nginx module, available as a package for many UNIX-like platforms. This module, by default, reads a small subset of simple (and readable) rules containing 99% of known patterns involved in websites vulnerabilities. For example, <<\/code>, |<\/code> or drop<\/code> are not supposed to be part of a URI.<\/p>\n

Being very simple, those patterns may match legitimate queries, it is NAXSI's administrator duty to add specific rules that will whitelist those legitimate behaviours. The administrator can either add whitelists manually by analyzing Nginx's error log, or (recommended) start the project by an intensive auto-learning phase that will automatically generate whitelisting rules regarding website's behaviour.<\/p>\n