Normalization Techniques Checklist- Base

Uncategorized
Normalization is the preprocessing step performed by Web Application Firewalls (WAFs) to decode and transform incoming HTTP requests before applying security logic like signature inspection or rule-based checks. Attackers often…

Unified Exploit Classification Matrix

Uncategorized
Entity AV Type Risk Detection Type Example Param Value SQLi Specific Signature id=1' or '1'='1 matches CVE signature Header Value RFI General Meta Characters User-Agent: php://input with path traversal marker…

Entities (E1–E4)

Uncategorized
Code Name Focus Used In E1 Request Input Entities User input, payload Signatures, Restrictions E2 Source & Frequency IP, Geo, Sessions, RPS Anomalies, Rate Limiting E3 Protocol & RFC Behavior…

Web Exploits (CAV – Common Attack Vectors)

Uncategorized
Injection Attacks SQL Injection (SQLi) OS Command Injection (RCE) XML External Entity (XXE) Server-Side Template Injection (SSTI) LDAP Injection Expression Language Injection (EL Injection) Cross-Site Attacks Cross-Site Scripting (XSS) –…

WAF Vendor list

WAF Vendor list
Major Vendors F5 Cloudflare Imperva AWS WAF Azure Front Door Akamai Fortinet Barracuda Radware Google Cloud Armor Fastly StackPath Citrix Nginx App Protect