By ripberge - 3 days ago
Showing first level comment(s)
ecesena - 16 hours ago
Most of them are just a ruleset of common basic SQL injections that it hopes to detect and block. If it even actually works the attacker just changes a few characters and easily gets past the block.
You are better fuzzing, using the ruleset to test your code in development detect the SQL injections and fix them. Now your code is secure, there is no extra setup, there is no extra latency, there is no extra complexity, there is no way around this security, its secure security.
dangerface - 2 days ago
0x01030307 - a day ago
You might protect your web-facing service, but what about someone already inside your network (RAT)?
WAFs are an additional measure, that you probably can't deploy between each pair of machines that communicate together. Have someone perform a pentest, see how bad it is. Also, they're expensive, more so than a check for weird chars in a comment field.
moviuro - 2 days ago