PATH:
opt
/
bitninja-waf3
/
coreruleset
/
BitNinja
SecRule TX:BLOCKING_INBOUND_ANOMALY_SCORE "@ge %{tx.inbound_anomaly_score_threshold}" \ "phase:2,\ id:1010000,\ t:none,\ auditlog,\ deny,\ msg:'Pattern [%{tx.bn_pattern}]',logdata:'LogPattern [%{tx.bn_pattern}]'" SecRule TX:BLOCKING_OUTBOUND_ANOMALY_SCORE "@ge %{tx.outbound_anomaly_score_threshold}" \ "phase:2,\ id:1010020,\ t:none,\ auditlog,\ deny,\ msg:'Pattern [%{tx.bn_pattern}]',logdata:'LogPattern [%{tx.bn_pattern}]'" SecRule TX:BN_INBOUND_FOUND "@gt 0" \ "phase:2,\ id:1010030,\ t:none,\ auditlog,\ deny,\ msg:'Pattern [%{tx.bn_pattern}]',logdata:'LogPattern [%{tx.bn_pattern}]'" SecRule TX:BN_OUTBOUND_FOUND "@gt 0" \ "phase:2,\ id:1010040,\ t:none,\ auditlog,\ deny,\ msg:'Pattern [%{tx.bn_pattern}]',logdata:'LogPattern [%{tx.bn_pattern}]'"
[-] 405-MAGENTO-REMOTE-EXECUTION-PROTECTION.conf
[edit]
[-] 400030-status.conf
[edit]
[+]
..
[-] 404-SCANNER-PROTECTION.conf
[edit]
[-] malware-endpoints.data
[edit]
[-] 419-REQUEST-BLOCKING-EVALUATION-BN.conf
[edit]
[-] 402-DRUPAL-REMOTE-EXECUTION-PROTECTION.conf
[edit]
[-] 401-WORDPRESS-BACKDOOR-PROTECTION.conf
[edit]
[-] 410-OTHER-BN.conf
[edit]
[-] 400-BITNINJA-INITIALIZATION.conf
[edit]
[-] scripting-user-agents.data
[edit]
[-] 104-TYPO3-MAGENTO-EXCLUSION-RULES.conf
[edit]
[-] botnet-post-request.data
[edit]
[-] 407-BOTNET-PROTECTION.conf
[edit]
[-] 406-WORDPRESS-PLUGIN-VULNERABILITY-PROTECTION.conf
[edit]
[-] 403-MODX-REVOLUTION-REMOETE-EXECUTION-PROTECTION.conf
[edit]
[-] 408-SYMFONY-PROTECTION-BN.conf
[edit]
[-] 409-ANTIMALWARE-PROTECTION-BN.conf
[edit]
[-] web-shell-uri.data
[edit]