On Tue, Oct 26, 2010 at 3:45 PM, Jason 'XenoPhage' Frisvold
<[email protected]> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 10/26/2010 02:29 PM, dan (ddp) wrote:
>> The only thing I can think of is to watch the logs and implement
>> ignore rules for the legitimate stuff you come across. Be as specific
>> as possible.
>
> Ouch ..  So much for sanity..
>
> Well, no one said security was easy, right?
>

Unfortunately there are too many possibilities for bad things to look
at, you won't be able to create rules for all of the ways someone can
use directory traversal.

Might as well filter out the stuff you know is ok. And get revenge on
the web devs. :P

I wonder if a directory traversal with a 404 response would be useful.

> - --
> - ---------------------------
> Jason 'XenoPhage' Frisvold
> [email protected]
> - ---------------------------
> "Any sufficiently advanced magic is indistinguishable from technology."
> - - Niven's Inverse of Clarke's Third Law
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.14 (GNU/Linux)
> Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/
>
> iEYEARECAAYFAkzHL94ACgkQ8CjzPZyTUTRPjgCbBpNyx9PwXmoskNzJStRy62kA
> fVIAn3pGsbzSwOWVAjA1dwtV9v9HFYEU
> =k8aq
> -----END PGP SIGNATURE-----
>

Reply via email to