PageRenderTime 48ms CodeModel.GetById 22ms RepoModel.GetById 0ms app.codeStats 0ms

/README.md

https://bitbucket.org/lazy_dogtown/doxi-rules
Markdown | 99 lines | 59 code | 40 blank | 0 comment | 0 complexity | a79200f877358527a41aafcde6539e1d MD5 | raw file
  1. # README.rulesets for doxi / dogtown-naxi-rules
  2. - Readme-Version: 2014-04-04
  3. - [latest ruleset-commits](https://bitbucket.org/lazy_dogtown/doxi-rules/src)
  4. - [Doxi-News Blog](http://blog.dorvakt.org/)
  5. these rulesets are now available as independent git-repo @
  6. [bitbucket.org/lazy_dogtown/doxi-rules](https://bitbucket.org/lazy_dogtown/doxi-rules)
  7. for tools to manage your doxi-rules you might want to install doxi-tools
  8. [bitbucket.org/lazy_dogtown/doxi](https://bitbucket.org/lazy_dogtown/doxi)
  9. to keep track of changes and ruleset-updates you could either
  10. subscribe to the [doxi-news - blog](http://blog.dorvakt.org/) ([rss-feed](http://blog.dorvakt.org/feeds/posts/default)),
  11. subscribe to the naxsi-mailinglist
  12. https://groups.google.com/forum/?fromgroups#!forum/naxsi-discuss or
  13. subscribe to the [ruleset-commit-feed](https://bitbucket.org/lazy_dogtown/doxi-rules/rss)
  14. or follow that project on Bitbucket
  15. License: see License.txt
  16. all not-mentioned files here are part of naxsi/nginx - default-configuration
  17. # configuration rules
  18. please note: due to changes in naxsi after 0.49 this file-layout might get
  19. obsolete.
  20. ### rules.conf
  21. - your global includes-file; you might setup different rules.con - files,
  22. - maybe tuned for each virtualhost.
  23. ### learning-mode.rules
  24. - rules to configure/enable learning-mode
  25. ### active-mode.rules
  26. - rules to configure active-mode (block)
  27. # detection rules
  28. ### app_server.rules
  29. - rules you might want to enable when running nginx as lb/proxy
  30. for app-servers like tomcat / rails etc and you're shure to
  31. have no php/asp/cgi - files lying around
  32. ### malware.rules
  33. **NOTE: for a better coverage you might want to try a real ids
  34. like snort or suricata with et-rulesets rules to detect malicious
  35. content in- and outbound. **
  36. - this ruleset is designed to detect malicious request that give a
  37. hint for hacked / misused / C&C-servers and tries to detect
  38. web-backdoors, webshells and other malicious access to unwanted
  39. files/services.
  40. - **CAUTION:** these rules are quite noise, so if included you might want to
  41. tune and create whitelists for your applications
  42. ### scanner.rules
  43. - detect scanners (WebAppScanners/Testing-Tools
  44. - detetc vuln-scanning-bots or attack-tools) by UA or by certain requests.
  45. - some of these rules could be included into web_[app|server].rules,
  46. like scanners for certain webapp/server-vulns, but when there's a
  47. clear sign for an automated scanning-process the sigs are include here
  48. - **CAUTION:** these rules are quite noise, so if included you might want to
  49. tune and create whitelists for your applications
  50. ### web_app.rules
  51. - detect exploit/misuse-attempts againts web-applications; please see
  52. scanner.rules for some details on webapp-based scanners
  53. ### web_server.rules
  54. - generic rules to protect a webserver from misconfiguration
  55. and known mistakes / exploit-vectors
  56. # misc. rules (obsolete, not maintained after jan 2014)
  57. # misc_whitelisting.rules
  58. - whitelistings for different webapps/actions that are known to fail
  59. on certain parameters