Chapter 35 ADP
ZyWALL USG 300 User’s Guide
646
DOUBLE-ENCODING
ATTACK
This rule is IIS specific. IIS does two passes through the
request URI, doing decodes in each one. In the first pass,
IIS encoding (UTF-8 unicode, ASCII, bare byte, and %u) is
done. In the second pass ASCII, bare byte, and %u
encodings are done.
IIS-BACKSLASH-
EVASION ATTACK
This is an IIS emulation rule that normalizes backslashes to
slashes. Therefore, a request-URI of “/abc\xyz” gets
normalized to “/abc/xyz”.
IIS-UNICODE-
CODEPOINT-ENCODING
ATTACK
This rule can detect attacks which send attack strings
containing non-ASCII characters encoded by IIS Unicode.
IIS Unicode encoding references the unicode.map file.
Attackers may use this method to bypass system
parameter checks in order to get information or privileges
from a web server.
MULTI-SLASH-
ENCODING ATTACK
This rule normalizes multiple slashes in a row, so something
like: “abc/////////xyz” get normalized to “abc/xyz”.
NON-RFC-DEFINED-
CHAR ATTACK
This rule lets you receive a log or alert if certain non-RFC
characters are used in a request URI. For instance, you may
want to know if there are NULL bytes in the request-URI.
NON-RFC-HTTP-
DELIMITER ATTACK
This is when a newline “\n” character is detected as a
delimiter. This is non-standard but is accepted by both
Apache and IIS web servers.
OVERSIZE-CHUNK-
ENCODING ATTACK
This rule is an anomaly detector for abnormally large chunk
sizes. This picks up the apache chunk encoding exploits and
may also be triggered on HTTP tunneling that uses chunk
encoding.
OVERSIZE-REQUEST-
URI-DIRECTORY ATTACK
This rule takes a non-zero positive integer as an argument.
The argument specifies the max character directory length
for URL directory. If a URL directory is larger than this
argument size, an alert is generated. A good argument
value is 300 characters. This should limit the alerts to IDS
evasion type attacks, like whisker.
SELF-DIRECTORY-
TRAVERSAL ATTACK
This rule normalizes self-referential directories. So, “/abc/./
xyz” gets normalized to “/abc/xyz”.
U-ENCODING ATTACK
This rule emulates the IIS %u encoding scheme. The %u
encoding scheme starts with a %u followed by 4
characters, like %uXXXX. The XXXX is a hex encoded value
that correlates to an IIS unicode codepoint. This is an ASCII
value. An ASCII character is encoded like, %u002f = /,
%u002e = ., etc.
UTF-8-ENCODING
ATTACK
The UTF-8 decode rule decodes standard UTF-8 unicode
sequences that are in the URI. This abides by the unicode
standard and only uses % encoding. Apache uses this
standard, so for any Apache servers, make sure you have
this option turned on. When this rule is enabled, ASCII
decoding is also enabled to enforce correct functioning.
Table 176
HTTP Inspection and TCP/UDP/ICMP Decoders (continued)
LABEL
DESCRIPTION
Summary of Contents for Unified Security Gateway ZyWALL 300
Page 2: ......
Page 30: ...Table of Contents ZyWALL USG 300 User s Guide 30 ...
Page 31: ...31 PART I User s Guide ...
Page 32: ...32 ...
Page 38: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 300 User s Guide 38 ...
Page 46: ...Chapter 2 Features and Applications ZyWALL USG 300 User s Guide 46 ...
Page 64: ...Chapter 3 Web Configurator ZyWALL USG 300 User s Guide 64 ...
Page 74: ...Chapter 4 Installation Setup Wizard ZyWALL USG 300 User s Guide 74 ...
Page 116: ...Chapter 6 Configuration Basics ZyWALL USG 300 User s Guide 116 ...
Page 184: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 184 ...
Page 221: ...221 PART II Technical Reference ...
Page 222: ...222 ...
Page 288: ...Chapter 11 Registration ZyWALL USG 300 User s Guide 288 ...
Page 378: ...Chapter 14 Trunks ZyWALL USG 300 User s Guide 378 ...
Page 394: ...Chapter 15 Policy and Static Routes ZyWALL USG 300 User s Guide 394 ...
Page 408: ...Chapter 16 Routing Protocols ZyWALL USG 300 User s Guide 408 ...
Page 428: ...Chapter 19 NAT ZyWALL USG 300 User s Guide 428 ...
Page 454: ...Chapter 23 Authentication Policy ZyWALL USG 300 User s Guide 454 ...
Page 472: ...Chapter 24 Firewall ZyWALL USG 300 User s Guide 472 ...
Page 534: ...Chapter 27 SSL User Screens ZyWALL USG 300 User s Guide 534 ...
Page 536: ...Chapter 28 SSL User Application Screens ZyWALL USG 300 User s Guide 536 ...
Page 544: ...Chapter 29 SSL User File Sharing ZyWALL USG 300 User s Guide 544 ...
Page 638: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 638 Figure 448 Profiles Protocol Anomaly ...
Page 682: ...Chapter 37 Content Filter Reports ZyWALL USG 300 User s Guide 682 ...
Page 700: ...Chapter 38 Anti Spam ZyWALL USG 300 User s Guide 700 ...
Page 722: ...Chapter 39 Device HA ZyWALL USG 300 User s Guide 722 ...
Page 738: ...Chapter 40 User Group ZyWALL USG 300 User s Guide 738 ...
Page 744: ...Chapter 41 Addresses ZyWALL USG 300 User s Guide 744 ...
Page 756: ...Chapter 43 Schedules ZyWALL USG 300 User s Guide 756 ...
Page 772: ...Chapter 45 Authentication Method ZyWALL USG 300 User s Guide 772 ...
Page 794: ...Chapter 46 Certificates ZyWALL USG 300 User s Guide 794 ...
Page 806: ...Chapter 48 SSL Application ZyWALL USG 300 User s Guide 806 ...
Page 811: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 811 ...
Page 866: ...Chapter 50 System ZyWALL USG 300 User s Guide 866 ...
Page 873: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 873 ...
Page 886: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 886 ...
Page 916: ...Chapter 54 Packet Flow Explore ZyWALL USG 300 User s Guide 916 ...
Page 918: ...Chapter 55 Reboot ZyWALL USG 300 User s Guide 918 ...
Page 920: ...Chapter 56 Shutdown ZyWALL USG 300 User s Guide 920 ...
Page 948: ...Chapter 58 Product Specifications ZyWALL USG 300 User s Guide 948 ...
Page 1014: ...Appendix A Log Descriptions ZyWALL USG 300 User s Guide 1014 ...
Page 1124: ...Appendix F Open Software Announcements ZyWALL USG 300 User s Guide 1124 ...