Tag

waf

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
May 6, 2025 · Operations

How to Install Nginx+Lua and a Web Application Firewall (WAF) with OpenResty

This guide explains step‑by‑step how to set up a Web Application Firewall by installing LuaJIT, ngx_devel_kit, lua‑nginx‑module, compiling Nginx with Lua support, fixing common errors, and optionally using OpenResty, followed by configuring and testing the ngx_lua_waf module.

BackendInstallationLua
0 likes · 8 min read
How to Install Nginx+Lua and a Web Application Firewall (WAF) with OpenResty
php中文网 Courses
php中文网 Courses
Jan 27, 2025 · Information Security

How to Prevent SQL Injection in PHP Applications

This article explains essential techniques to protect PHP applications from SQL injection attacks, covering prepared statements, input validation, ORM usage, escaping, stored procedures, permission restrictions, web application firewalls, and logging, with practical code examples for PDO, MySQLi, and Eloquent.

ORMPHPSQL injection
0 likes · 5 min read
How to Prevent SQL Injection in PHP Applications
Java Architect Essentials
Java Architect Essentials
Oct 15, 2024 · Backend Development

How an 8‑Byte Request Size Limit Crashed Production in a Serverless Backend

A seemingly tiny 8‑byte request body size restriction caused a production outage in a serverless education platform, leading the team through extensive debugging, discovery of an AWS WAF payload limit, and ultimately a fix that highlighted the importance of proper documentation and infrastructure awareness.

AWSBackenddebugging
0 likes · 11 min read
How an 8‑Byte Request Size Limit Crashed Production in a Serverless Backend
Practical DevOps Architecture
Practical DevOps Architecture
Nov 20, 2023 · Backend Development

Implementing a Dynamic IP Blacklist with Nginx, Lua, and Redis

This guide explains how to build a dynamic IP blacklist using Nginx, Lua, and Redis, covering installation of LuaJIT, compiling Nginx with required modules, configuring Redis, writing Lua access‑limit scripts, and verifying that frequent requests are automatically blocked for a set period.

BackendIP blacklistLua
0 likes · 9 min read
Implementing a Dynamic IP Blacklist with Nginx, Lua, and Redis
php中文网 Courses
php中文网 Courses
Jun 11, 2023 · Information Security

Protecting Nginx with a ModSecurity Web Application Firewall (WAF)

This article explains why web applications need a Web Application Firewall, introduces ModSecurity as a WAF for Nginx, and provides step‑by‑step installation, configuration, custom rule creation, and service restart commands to defend against attacks such as SQL injection and XSS.

ModSecuritySQL injectionWeb Security
0 likes · 4 min read
Protecting Nginx with a ModSecurity Web Application Firewall (WAF)
Bilibili Tech
Bilibili Tech
Jan 17, 2023 · Information Security

Botnet Threat Analysis and Detection Strategies: PBot, Xanthe and Countermeasures

The article delivers a technical overview of modern botnet threats, detailing the PBot and Xanthe families, their infection vectors, command‑and‑control operations, and provides practical detection, mitigation, and statistical analysis methods for defending against large‑scale DDoS, spam, and other malicious activities.

DetectionSuricatabotnet
0 likes · 17 min read
Botnet Threat Analysis and Detection Strategies: PBot, Xanthe and Countermeasures
Tencent Cloud Developer
Tencent Cloud Developer
Jan 16, 2023 · Cloud Native

Scaling Sheep, Sheep, Sheep to Support 100 Million Daily Active Users: A Tencent Cloud Case Study

Tencent Cloud helped the viral game 《羊了个羊》 scale from 5,000 QPS to support over 100 million daily active users in a week by using serverless Kubernetes auto‑scaling, real‑time logging, WAF/Anti‑DDoS protection, CDN, and read‑write separation with Redis, achieving high performance, availability, and scalability.

Cloud NativeHigh AvailabilityTKE Serverless
0 likes · 12 min read
Scaling Sheep, Sheep, Sheep to Support 100 Million Daily Active Users: A Tencent Cloud Case Study
Architecture Digest
Architecture Digest
Jun 5, 2022 · Information Security

Root Cause Analysis of Cross-Origin Request Errors Triggered by WAF XSS Filtering

The article details a step‑by‑step investigation of a form‑submission cross‑origin error in a front‑back separated system, tracing the HTTP request flow through DNS, Nginx, Tomcat, and finally identifying a WAF XSS rule that blocked a specific moduleExport field, and explains how the issue was resolved by adjusting the WAF configuration.

CORSHTTPTomcat
0 likes · 12 min read
Root Cause Analysis of Cross-Origin Request Errors Triggered by WAF XSS Filtering
vivo Internet Technology
vivo Internet Technology
May 11, 2022 · Information Security

Investigation and Resolution of Cross-Origin Errors Caused by WAF XSS Filtering in a Front‑End/Back‑End Separated System

The article recounts a real‑world incident where a JSON POST from a front‑end domain triggered a cross‑origin 418 error because a Web Application Firewall’s XSS filter mistakenly blocked a JavaScript validator field, and after the security team modified the WAF rules the issue was resolved, highlighting systematic debugging and deep knowledge of DNS, Nginx, ingress, Tomcat and WAF layers.

CORSCross-OriginHTTP
0 likes · 12 min read
Investigation and Resolution of Cross-Origin Errors Caused by WAF XSS Filtering in a Front‑End/Back‑End Separated System
HomeTech
HomeTech
Dec 28, 2021 · Information Security

SQL Injection Vulnerability Analysis and Defense Strategies

This article provides a comprehensive analysis of SQL injection vulnerabilities, covering their principles, testing tools, repair methods, and defense strategies, with practical implementation guidance for secure web application development.

OWASPSQL injectionWeb Security
0 likes · 15 min read
SQL Injection Vulnerability Analysis and Defense Strategies
Architects Research Society
Architects Research Society
Aug 6, 2020 · Information Security

SQL Injection Attacks: Statistics, Real‑World Examples, and Protection Strategies

This article examines the prevalence of SQL injection attacks, presenting Imperva’s recent statistics, common attack vectors, real-world examples, and practical defenses such as prepared statements, input sanitization, and web application firewalls, while also offering Python code illustrations of secure and insecure database queries.

SQL injectionWeb Securitydatabase security
0 likes · 11 min read
SQL Injection Attacks: Statistics, Real‑World Examples, and Protection Strategies
Efficient Ops
Efficient Ops
Jul 20, 2020 · Information Security

Mastering WAF Deployment: Strategies, Modes, and Load‑Balancing Design

This article examines the rise of web‑application firewalls, outlines common deployment challenges, compares several WAF operating modes—including bypass, layer‑2 transparent, and proxy architectures—and proposes load‑balancing strategies to achieve secure, high‑availability web services.

DeploymentLoad BalancingWeb Security
0 likes · 12 min read
Mastering WAF Deployment: Strategies, Modes, and Load‑Balancing Design
Youzan Coder
Youzan Coder
Dec 13, 2019 · Information Security

Boundary Defense in Enterprise Security: Definitions, Value, Techniques, and Youzan’s Implementation

Boundary defense—protective measures at business and IT entry points such as firewalls, WAFs, and secure development lifecycles—provides early‑stage enterprises a clear perimeter through detection, response, protection, and policy, as illustrated by Youzan’s web‑gate WAF, SDL checkpoints, DNS monitoring, and automated security‑ticket processes, enabling a shift toward deeper, defense‑in‑depth strategies.

Enterprise SecuritySDLboundary defense
0 likes · 18 min read
Boundary Defense in Enterprise Security: Definitions, Value, Techniques, and Youzan’s Implementation
Architecture Digest
Architecture Digest
Aug 11, 2017 · Information Security

Common Web Attacks and Their Mitigation Techniques

The article introduces major web security threats such as XSS, injection, CSRF, explains their mechanisms with examples, and presents defensive measures including input sanitization, HttpOnly cookies, web application firewalls, and encryption methods like hashing, symmetric and asymmetric cryptography.

CSRFEncryptionSQL injection
0 likes · 10 min read
Common Web Attacks and Their Mitigation Techniques
Qunar Tech Salon
Qunar Tech Salon
Oct 17, 2016 · Information Security

Design and Implementation of a Cloud‑Based Web Application Firewall at Ctrip

This article describes Ctrip's challenges with web security, evaluates hardware and commercial cloud WAF shortcomings, and presents a low‑cost, low‑risk cloud‑based WAF solution that leverages DNS redirection, closed‑loop rule management, Lua/Tengine deployment, supervised machine‑learning log analysis, and big‑data streaming for real‑time threat detection and mitigation.

Big DataCloud SecurityLog Analysis
0 likes · 9 min read
Design and Implementation of a Cloud‑Based Web Application Firewall at Ctrip
Efficient Ops
Efficient Ops
Jan 20, 2016 · Information Security

Build Your Own Nginx+Lua Web Application Firewall: Step‑by‑Step Guide

This article walks you through designing, installing, and configuring a custom WAF using Nginx and Lua (OpenResty), covering core modules, pain points of native Nginx security, code examples, deployment tips, and future enhancements for robust web protection.

DevOpsLuaOpenResty
0 likes · 12 min read
Build Your Own Nginx+Lua Web Application Firewall: Step‑by‑Step Guide
Architect
Architect
Jan 19, 2016 · Information Security

100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook

The article presents a comprehensive list of one hundred concrete web‑application security techniques—ranging from HTTP request analysis and token validation to WAF rule conversion, honeypot deployment, IP reputation checks, and response‑time monitoring—derived from the book “Web Application Defender's Cookbook” and illustrated with real‑world examples and tool references.

Defense TechniquesModSecurityWeb Security
0 likes · 16 min read
100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook
Qunar Tech Salon
Qunar Tech Salon
Dec 17, 2015 · Information Security

100 Web Application Defense Techniques from the ‘Web Application Defender’s Cookbook’

The article presents a comprehensive list of one hundred practical web‑application defense techniques—ranging from HTTP request analysis and ModSecurity rule creation to honeypot deployment and automated threat intelligence—drawn from the under‑appreciated book “Web Application Defender’s Cookbook.”

Defensive TechniquesModSecurityWeb Security
0 likes · 17 min read
100 Web Application Defense Techniques from the ‘Web Application Defender’s Cookbook’