Recipe 12-4: Identifying Request Flow Anomalies
This recipe shows you how to identify when clients make a series of requests different from the expected order.
Ingredients
- ModSecurity
- SecDisableBackendCompression directive
- SecContentInjection directive
- SecStreamOutBodyInspection directive
- SecEncryptionEngine directive
- SecEncryptionKey directive
- SecEncryptionParam directive
- SecEncryptionMethodRx directive
CAPEC-140: Bypassing of Intermediate Forms in Multiple-Form Sets
Sample Attacks
Banking trojan software such as Zeus and SpyEye offers many ways to automate the process of creating new payee accounts and transferring funds to money mules. In these scenarios, banking trojans often don’t follow ...