Skip to Content
Web Application Defender's Cookbook
book

Web Application Defender's Cookbook

by Ryan C. Barnett, Jeremiah Grossman
December 2012
Intermediate to advanced
552 pages
13h 16m
English
Wiley
Content preview from Web Application Defender's Cookbook
Recipe 4-5: Detecting Malicious Links
This recipe demonstrates how to use third-party RBLs to identify malicious URLs sent to or served from your site.
Ingredients
  • URI Blacklist RBL6
  • Google’s Safe Browsing API7
  • ModSecurity
    • @rbl operator
    • @gsbLookup operator
    • @rsub operator
    • SecGsbLookupDb directive
    • SecStreamOutBodyInspection directive
    • SecContentInjection directive
    • STREAM_OUTPUT_BODY variable
Suspicious URL Identification
Using RBLs to identify known malicious clients has obvious merit. Although this information does help provide immediate data about a client’s disposition, it is insufficient on its own, because malicious clients constantly change their source location. They employ a variety of methods to loop through anonymizing systems such as the Tor network or compromised hosts to easily alter their IP address information. Sometimes the key to identifying malicious behavior is not where you are coming from but what data you are sending.
This brings us to the final recipe, which uses third-party reputation systems. However, the data analyzed is not the client’s IP address but URLs and domain names. Comment spammers and malware criminals always are looking for ways to post their hyperlinks on web sites. They hope to either drive up search engine optimization (SEO) efforts or conduct “drive-by downloads,” which aim to compromise clients’ computers with malicious code.
The challenge for web application defenders in this scenario is to be able to distinguish a malicious ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Web Site Cookbook

Web Site Cookbook

Doug Addison

Publisher Resources

ISBN: 9781118417058Purchase book