Identifying Probes and Blocking Well-Known Offenders

During the initial reconnaissance phase of most web attacks, the attackers will need to interact with the web server or application to gather information. They can then use this information to better plan for the actual exploit scenario. While these requests are not the actual exploits themselves, they are still a critical piece of the puzzle for an attacker. This is why we, as web security practitioners, need to pay close attention to the initial probe requests sent to our servers, as they are often omens of the attack to come.

Worm Probes

The use of worm programs to automatically scan and compromise web servers has been growing over the last few years. First, there were worms such as Sadmind, ...

Get Preventing Web Attacks with Apache now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.