Chapter 30 ADP
Protocol Anomaly Background Information
The following sections may help you configure the protocol anomaly profile screen (see Section 30.3.5 on page 520)
HTTP Inspection and TCP/UDP/ICMP Decoders
The following table gives some information on the HTTP inspection, TCP decoder, UDP decoder and ICMP decoder ZyWALL protocol anomaly rules.
Table 170 HTTP Inspection and TCP/UDP/ICMP Decoders
LABEL | DESCRIPTION |
HTTP Inspection |
|
|
|
This rule deals with | |
ATTACK | Apache uses this, so if you have an Apache server, you need to |
| enable this option. |
|
|
This rule can detect attacks where malicious attackers use ASCII- | |
| encoding to encode attack strings. Attackers may use this method to |
| bypass system parameter checks in order to get information or |
| privileges from a web server. |
|
|
Bare byte encoding uses | |
ENCODING ATTACK | decoding |
| |
| allows the user to emulate an IIS server and interpret |
| encodings correctly. |
|
|
This is a rule to decode | |
ATTACK | detect attacks where malicious attackers use |
| encode attack strings. Attackers may use this method to bypass |
| system parameter checks in order to get information or privileges |
| from a web server. |
|
|
This rule normalizes directory traversals and | |
ATTACK | directories. So, “/abc/this_is_not_a_real_dir/../xyz” get normalized to |
| “/abc/xyz”. Also, “/abc/./xyz” gets normalized to “/abc/xyz”. If a user |
| wants to configure an alert, then specify “yes”, otherwise “no”. This |
| alert may give false positives since some web sites refer to files |
| using directory traversals. |
|
|
This rule is IIS specific. IIS does two passes through the request | |
ATTACK | URI, doing decodes in each one. In the first pass, IIS encoding |
| |
| pass ASCII, bare byte, and %u encodings are done. |
|
|
This is an IIS emulation rule that normalizes backslashes to slashes. | |
ATTACK | Therefore, a |
|
|
This rule can detect attacks which send attack strings containing | |
ATTACK | encoding references the unicode.map file. Attackers may use this |
| method to bypass system parameter checks in order to get |
| information or privileges from a web server. |
|
|
This rule normalizes multiple slashes in a row, so something like: | |
ATTACK | “abc/////////xyz” get normalized to “abc/xyz”. |
|
|
This rule lets you receive a log or alert if certain | |
ATTACK | are used in a request URI. For instance, you may want to know if |
| there are NULL bytes in the |
|
|
This is when a newline “\n” character is detected as a delimiter. This | |
DELIMITER ATTACK | is |
| servers. |
|
|
| 527 |
ZyWALL USG 100/200 Series User’s Guide | |
|
|