Christian Folini ⛑️ 

733 Followers
319 Following
76 Posts
Author of the #ModSecurity Handbook 2ed, #OWASP #CoreRuleSet project co-lead and trainer. Program chair #SwissCyberStorm. Helmet wearer from 🇨🇭.
I predicted that sooner or later a 🇨🇭 association for the disabled would sue for #EVoting. We're not yet there, but the strong Schweizerische Blindenverband is raising the pressure.
Also: Clear call for #ECollecting
https://www.inside-it.ch/blindenverband-fordert-umgehend-e-voting-20230905
Blindenverband fordert umgehend E-Voting

Mit der Einführung der elektronischen Stimmenabgabe soll die Diskriminierung von Blinden bei der Wahrnehmung des Stimm- und Wahlrechts beendet werden.

@michelamarie Ah, and before I forget: Shodan is blocked at PL2, but we might want to consider it per default.
@michelamarie We're doing a multi-level approach here. Via the CRS paranoia levels if you are familiar with the concept. So the list above are the worst, then a myriad of other bad UAs on PL2 and then finally some stuff you usually welcome on a server like search engine bots. They will also be blocked at PL4 and you need to allow them specifically if you want to have them on that security level.

@michelamarie @Edent As it happens I pushed a pull request to CRS (the OWASP ModSecurity Core Rule Set project) lately. It's about almost 2K bad user agents.

https://github.com/coreruleset/coreruleset/pull/3202

Headless Chrome is on the list.

feat: scanner overhaul: new rules, new data files by dune73 · Pull Request #3202 · coreruleset/coreruleset

It's been a lot of work, but here is the PR that brings new rules to inspect the user-agent of clients: We have 3 existing rules focusing on the user agent. 913100 and two PL2 stricter siblings: 9...

GitHub

I've consolidated a list of security scanners user agents. Many modern one send a fake UA. But some don't. Here is the list - minus public security services such as ssllabs; all lowerkey and abbreviated to essential keyword:

betabot
bewica-security-scan
dirbuster
fimap
gobuster
havij
hexometer
jbrofuzz
jorgee
libwhisker
masscan
massscan
morfeus fucking scanner
nessus
netlab360
netsparker
nikto
nmap
nuclei
openvas
sitelockspider
sqlmap
sysscan
w3af.org
webbandit
webshag
wfuzz
whatweb
wprecon
wpscan
zgrab
zmeu

I've gone through many, many different sources. Did I miss anything?

@MirkoDziadzka Yes, I've seen it before. Is not there a PHP library too? I thought about making this a ModSecurity rule set but never got going. With the CRS plugin functionality, I think it would be possible to run this in lua, cache the results (key: Hash of the UA) and then display the consolidated identifier of the browser in the access log. I think that would be really, really useful.

1st real use case for chatgpt where it allows me to perform something I would not attempt without assistance:

Qualify a list of ~2K user agents I grabbed from github. Chatgpt tells me if they are popular at all and what their use case is.

Working with the CLI by @mmabrouk_.

The video of my @1ns0mn1h4ck keynote

"Crazy Incentives And How They Drive Security Into No Man's Land"

is now online.

Watch this if you believe in Bug Bounties, pie charts or if you think the shepherd got bad press when he cried wolf too often.

https://www.youtube.com/watch?v=612Pi_yk3s8

(KEYNOTE) Crazy Incentives And How They Drive Security Into No Man's Land by Dr. Christian Folini

YouTube
Ah, interesting twist. I'll investigate this option, thanks.
ACK