glossaire:crs
Différences
Ci-dessous, les différences entre deux révisions de la page.
| Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
| glossaire:crs [16/08/2010 14:33] – cyrille | glossaire:crs [04/04/2025 20:38] (Version actuelle) – cyrille | ||
|---|---|---|---|
| Ligne 1: | Ligne 1: | ||
| ====== CRS ====== | ====== CRS ====== | ||
| - | ===== Core Rule Set ===== | + | ===== Core Rule Set (OWASP) |
| - | Grâce au Core Rule Set (CRS), vous profitez d' | + | Grâce au [[/ |
| * Trojan, | * Trojan, | ||
| Ligne 11: | Ligne 11: | ||
| * injection de type SQL ou XSS, | * injection de type SQL ou XSS, | ||
| * etc. | * etc. | ||
| + | # Attack Detection: | ||
| + | |||
| + | * Malicious client software detection | ||
| + | * Generic Attack Detection | ||
| + | * SQL injection and Blind SQL injection. | ||
| + | * Cross Site Scripting (XSS). | ||
| + | * OS Command Injection and remote command access. | ||
| + | * File name injection. | ||
| + | * ColdFusion, PHP and ASP injection. | ||
| + | * E-Mail Injection | ||
| + | * HTTP Response Splitting. | ||
| + | * Universal PDF XSS. | ||
| + | * Trojans & Backdoors Detection | ||
| + | * Error Detection | ||
| + | * XML Protection | ||
| + | * Search Engine Monitoring | ||
| + | |||
| + | ModSecurity | ||
| + | |||
| + | Unlike intrusion detection and prevention systems, which rely on signatures specific to known vulnerabilities, | ||
| * [[http:// | * [[http:// | ||
| + | * https:// | ||
| * [[http:// | * [[http:// | ||
glossaire/crs.1281962013.txt.gz · Dernière modification : (modification externe)
