Uncategorized

Normalization Techniques Checklist- Base

Uncategorized
Normalization is the preprocessing step performed by Web Application Firewalls (WAFs) to decode and transform incoming HTTP requests before applying security logic like signature inspection or rule-based checks. Attackers often…

Unified Exploit Classification Matrix

Uncategorized
Entity AV Type Risk Detection Type Example Param Value SQLi Specific Signature id=1' or '1'='1 matches CVE signature Header Value RFI General Meta Characters User-Agent: php://input with path traversal marker…

Entities (E1–E4)

Uncategorized
Code Name Focus Used In E1 Request Input Entities User input, payload Signatures, Restrictions E2 Source & Frequency IP, Geo, Sessions, RPS Anomalies, Rate Limiting E3 Protocol & RFC Behavior…

Web Exploits (CAV – Common Attack Vectors)

Uncategorized
Injection Attacks SQL Injection (SQLi) OS Command Injection (RCE) XML External Entity (XXE) Server-Side Template Injection (SSTI) LDAP Injection Expression Language Injection (EL Injection) Cross-Site Attacks Cross-Site Scripting (XSS) –…