Shadow Daemon is a set of tools used to detect, record and prevent attacks on web applications. In short, Shadow Daemon is a Web Application Firewall (WAF) that can capture the request and refines various parameter suspicious. Shape Shadow Daemon is a modular system that is installed separately with web applications that will be analyzed.
Interest Shadow Daemon is to increase the security, flexibility, and can be updated with an easier way. Shadow Daemon including free software and released under the GPLv2 license.
What are the advantages of using Shadow Daemon? This is the review.
Easy to Use.
Shadow Daemon easy to install and set up with a clean web interface and structure. Their web interface allows users to check out the attack with detailed and clear. If the user only wants to keep the web without the need web interface, Shadow Daemon is mounted and configured without activating script web interface.
High Coverage.
Shadow Daemon using the connector at the application level to catch the request. Their connector ensures data can be analyzed in accordance with the input data on a web application. For connector installation is fairly easy, and requires no coding ability.
Web applications what can be protected Shadow Demon?
Detection accuracy.
Shadow Daemon combines blacklist, whitelist and integrity checks to detect suspicious request. Blacklist using a Regular Expression to find a pattern of attacks coming from user input. Whitelist is used to search for users who enter irregularly based on pre-defined rules. As for the integrity of the examination was used to compare the checksum of the script that is executed based on predefined rules.
Any kind of web attacks that can be detected by Shadow Daemon?
- SQL injection
- XML injection
- code injection
- Command injections
- Cross-site scripting
- Local / remote file inclusions
- backdoor access
- And many more
Discreet protection
Unlike other WAF, Shadow Daemon does not block suspicious requests. Instead, Shadow Daemon just filter suspicious parts and clean up these requests to be forwarded as usual.
That glimpse reviews Shadow Daemon, Web Application Firewall for web applications based on PHP, Python and Perl. Security and web application vulnerabilities must also be taken into account, so that web applications remains safe and protected from things that are not desirable.
Artikel keren lainnya:
Belum ada tanggapan untuk "Shadow Daemon , A Web Application Firewall for PHP, Python and Perl"
Post a Comment