-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Development #9
Merged
Merged
Development #9
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. Rename message_a to top_reported_ip_message in reported_stats(). 2. Add note about searching for other headers in proxy_connection_header_stats() docstring.
1. Add php easter eggs detection rule. 2. Jaws IoT webserver command injection detection. 3. Extend generic injection rule to check POST request body. 4. Additional MISC_SOFTWARE_PROBE_PATHS. 5. Datadog headers detection. 6. Fix missing comma in PROGRAMMATIC_USER_AGENTS. 7. Include proxy-authorization in proxy headers rule; refactor using a list. 8. Detect 'Hello, world' user-agent associated with Mirai botnet activity.
1. Include header values in command injection detection. 2. Add internet-measurement.com and gdnplus to RESEARCH_USER_AGENTS. 3. Misc comments
1. Use get_real_ip() to get remote IP, instead of repeating code. 2. Use variable requests_db in database connections, in place of repeating db filename. 3. Rename some variables to use snake_case. 4. Misc formatting + comments
1. Fix issue with opacity filter on .dim CSS class causing issues with dropdown menu in front of it; use a different color for .dim instead of filter().
1. Add 'Offline Explorer' and misspelled 'Mozila' to PROGRAMMATIC_USER_AGENTS. 2. Add security.ipip.net scanner to RESEARCH_USER_AGENTS.
1. Query for records with headers containing arbitrary string. 2. Hostname stats: query for records matching hostname + subdomains.
1. Escape headers + query args + POST request body when displaying on page. 2. Hostname now links to hostname_stats() view function to search for matching records.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
No description provided.