Would anyone be willing to participate in a ModSecurity project similar to what 
SANS Internet Storm Center is doing here -

Project announcement - http://isc.sans.edu/diary.html?storyid=11272
Project Scripts - http://isc.sans.edu/tools/404project.html
Some stats - http://isc.sans.edu/diary.html?storyid=11323

The idea would be to use live ModSecurity installations as pseudo-sensors to 
collect scanning data for 404 errors by adding in a new custom SecRule that 
would trigger an exec script.  The benefit of this approach is that there is 
less likelihood of exposing sensitive data while still identifying automatic 
probes.

If you are interested in participating, please email me directly.

Thanks,
Ryan Barnett
ModSecurity Project Lead
Trustwave SpiderLabs Research Team



________________________________
This transmission may contain information that is privileged, confidential, 
and/or exempt from disclosure under applicable law. If you are not the intended 
recipient, you are hereby notified that any disclosure, copying, distribution, 
or use of the information contained herein (including any reliance thereon) is 
STRICTLY PROHIBITED. If you received this transmission in error, please 
immediately contact the sender and destroy the material in its entirety, 
whether in electronic or hard copy format.

_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to