summaryrefslogtreecommitdiff
path: root/doc/source/features.rst
diff options
context:
space:
mode:
Diffstat (limited to 'doc/source/features.rst')
-rw-r--r--doc/source/features.rst12
1 files changed, 9 insertions, 3 deletions
diff --git a/doc/source/features.rst b/doc/source/features.rst
index b06aa98..076e4e4 100644
--- a/doc/source/features.rst
+++ b/doc/source/features.rst
@@ -150,6 +150,7 @@ This family of vulnerabilities lead to various CVE, like:
150- `CVE-2012-5692 <https://www.rapid7.com/db/modules/exploit/unix/webapp/invision_pboard_unserialize_exec>`_: Unauthenticated remote code execution in IP.Board 150- `CVE-2012-5692 <https://www.rapid7.com/db/modules/exploit/unix/webapp/invision_pboard_unserialize_exec>`_: Unauthenticated remote code execution in IP.Board
151 151
152 152
153.. _harden-rand-feature:
153 154
154Weak-PRNG via rand/mt_rand 155Weak-PRNG via rand/mt_rand
155^^^^^^^^^^^^^^^^^^^^^^^^^^ 156^^^^^^^^^^^^^^^^^^^^^^^^^^
@@ -238,6 +239,9 @@ This behaviour is suggested in the documentation:
238Exploitation, post-exploitation and general hardening 239Exploitation, post-exploitation and general hardening
239----------------------------------------------------- 240-----------------------------------------------------
240 241
242
243.. _virtual-patching-feature:
244
241Virtual-patching 245Virtual-patching
242^^^^^^^^^^^^^^^^ 246^^^^^^^^^^^^^^^^
243 247
@@ -262,6 +266,8 @@ of dangerous functions, droping them everywhere else:
262The intent is to make post-exploitation process (such as backdooring of legitimate code, or RAT usage) a lot harder for the attacker. 266The intent is to make post-exploitation process (such as backdooring of legitimate code, or RAT usage) a lot harder for the attacker.
263 267
264 268
269.. _global-strict-feature:
270
265Global strict mode 271Global strict mode
266^^^^^^^^^^^^^^^^^^ 272^^^^^^^^^^^^^^^^^^
267 273
@@ -300,7 +306,7 @@ and using this feature to lock this up.
300 306
301Dumping capabilities 307Dumping capabilities
302^^^^^^^^^^^^^^^^^^^^ 308^^^^^^^^^^^^^^^^^^^^
303It's possible to apply the ``dump(:str)`` filter to any virtual-patching rule, 309It's possible to apply the ``dump()`` filter to any virtual-patching rule,
304to dump the complete web request, along with the filename and the corresponding 310to dump the complete web request, along with the filename and the corresponding
305line number. By using the *right* set of restrictive rules (or by using the 311line number. By using the *right* set of restrictive rules (or by using the
306*overly* restrictives ones in ``simulation`` mode), you might be able 312*overly* restrictives ones in ``simulation`` mode), you might be able
@@ -335,8 +341,8 @@ Arbitrary file inclusion hardening
335"""""""""""""""""""""""""""""""""" 341""""""""""""""""""""""""""""""""""
336 342
337Arbitrary file inclusion is a common vulnerability, that might be detected 343Arbitrary file inclusion is a common vulnerability, that might be detected
338by preventing the use of anything else than a whitelist of extensions in calls 344by preventing the inclusion of anything that doens't match a strict set
339to ``include`` or ``require``. 345of file extensions in calls to ``include`` or ``require``.
340 346
341*Cheap* SQL injections detection 347*Cheap* SQL injections detection
342"""""""""""""""""""""""""""""""" 348""""""""""""""""""""""""""""""""