Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Last revision Both sides next revision | ||
litespeed_wiki:waf:comodo [2018/11/08 20:47] Jackson Zhang |
litespeed_wiki:waf:comodo [2018/11/08 20:49] Jackson Zhang [Method 2: Command injection attack] |
||
---|---|---|---|
Line 38: | Line 38: | ||
- To check CWAF for protection, send the request as shown below: <code>http://$server_domain/?a=b AND 1=1</code> The server will respond with a 403 status code \\ {{:litespeed_wiki:waf:comodo-5.png?500|}} | - To check CWAF for protection, send the request as shown below: <code>http://$server_domain/?a=b AND 1=1</code> The server will respond with a 403 status code \\ {{:litespeed_wiki:waf:comodo-5.png?500|}} | ||
- | ====Method 2: Command injection attack==== | + | ====Method 2 ==== |
- | - Create a delete.php file with following codes \\ <code> | + | You can check that CWAF works properly by sending a GET or POST request parameter ''cwaf_test_request=a12875a9e62e1ecbcd1dded1879ab06949566276'' |
- | <?php | + | |
- | print("Please specify the name of the file to delete"); | + | Like this: |
- | print("<p>"); | + | |
- | $file=$_GET['filename']; | + | http://$server_domain/?cwaf_test_request=a12875a9e62e1ecbcd1dded1879ab06949566276 |
- | system("rm $file"); | + | |
- | ?> | + | If the web server returns a 403 Forbidden status, then CWAF works fine. |
- | </code> | + | |
- | - Create a dummy file \\ <code>touch bob.txt</code> | + | |
- | - Open <code> http://$server_domain/delete.php?filename=bob.txt;id </code> | + | |
- | If WAF works, you will get a 403 forbidden page | + | |
===== Uninstall Comodo ===== | ===== Uninstall Comodo ===== |