
Having recently discussed monitoring ModSecurity with OSSEC, I'm looking forward to reading this book.
I've been a ModSecurity fan since incorporating it in a secure server implementation, back when it was version 1.9.4 in 2006, as part of a paper written for OWASP.
Expected highlights include:
* Securing your system by knowing exactly how a hacker would break into it
* Writing rules in-depth and ModSecurity rule language elements such as variables, actions, and request phases
* Covers the common attacks in use on the Web; find the geographical location of an attacker and send alert emails when attacks are discovered
* Many real-life examples for better understanding
I'll give you a detailed, honest assessment of ModSecurity 2.5 in a few weeks.
Cheers.
del.icio.us | digg | Submit to Slashdot
Please support the Open Security Foundation (OSVDB)
1 comment:
Hi Russ,
Ivan Ristic just announced "ModSecurity Handbook". You might want to take a look at it as well.
http://blog.ivanristic.com/2009/11/announcing-modsecurity-handbook.html
Regards,
Doug Burks
http://securityonion.blogspot.com
Post a Comment