11. Exploiting POST for Fun & DoS
•Determine:
• URL’s accepting POST
• Max size for POST
•Bypass CDN protections (POST isn’t
cache-able)
•Fingerprint both TCP & app at the
origin
Attackers work to identify weaknesses
in application infrastructure
Network Reconnaissance Example
21. Charts and Graphs
The following slides are examples of how to present statistics and
data in visual formats.
ASM’s unique Proactive Bot Defense and L7 DoS
Mitigating 30-40% across entire airline booking site
Two- to three-line summary of findings. Further detail in the right hand column below.
23. • The following slides are examples of how to present statistics
and
data in visual formats.
Two- to three-line summary of findings. Further detail in the right hand column below.
Mitigated over 90% of bot traffic during peak times for target URL.
As bot activity rises, Server Latency decreases with valid requests