Recipe 14-6: Spoofing Successful Attacks
This recipe shows you how to use ModSecurity to mimic successful attack responses.
Ingredients
- Apache
- OWASP ModSecurity Core Rule Set
- modsecurity_crs_41_sql_injection_attacks.conf
- ModSecurity
- STREAM_OUTPUT_BODY variable
- @eq operator
- @rsub operator
- pause action
- proxy action
- setenv action
The response actions within this recipe are extensions of the honeytrap concepts discussed in Chapter 3. Building on response Recipe 14-5, which focused on lengthening the time-to-hack window by slowing down automated attack tools, we can use another technique to achieve similar results. We do this by simulating that the attack sent to the application actually worked. How can we do this? We will look at two specific examples.
CAPEC-7: Blind SQL Injection