diff --git a/waf_patterns/apache/bots.conf b/waf_patterns/apache/bots.conf index 1a16af0..8f686d9 100644 --- a/waf_patterns/apache/bots.conf +++ b/waf_patterns/apache/bots.conf @@ -1,695 +1,128 @@ SecRuleEngine On -SecRule REQUEST_HEADERS:User-Agent "@contains " "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains " "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains " "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains " "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains " "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains " "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains " "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains " "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains " "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains
Wow! This is one *huge* list. You could’ve charged people just for viewing this post and I’m sure most of us wouldn’t mind forking out some money just to take a peek at this ;)
" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@containsThat list is to huge! lol, I tried to find the fake ones but then I looked at the list!
" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@containsLol, now I get it. There’s 3 *fake* user-agents in the list. Is it…”dumb”, “fuck” & “human”?
" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains@Lisa: I hope you don’t mean that I could have charged people to view the blacklist in like a “freakshow” kind of way. Like, “step right up and take a peek at the world’s most hideously long HTAccess Blacklist!” Weird carnival music playing in dark tents and that sort of thing..
" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains@ Lisa
" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains
hm…
" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains@Andrew: Nope, those strings address names of “real” user agents, believe it or not.. :)
" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@containsThat list is insane!!!
" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@containsI think looking at all of this it harks back to Louis earlier idea of a whitelist;
" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@containsHi, I think this is fantastic. I have one issue, my server gives a 500 error and the log shows :
" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@containsWell, I got it working, needed to fix a few things and break it over two lines, here are the results, let me know if this will still work as I dont really know htaccess code that well:
" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@containsHi,
" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains Built w/ shapeSpace • " "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains " "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains
FALL2024takes 25% OFF our Pro Plugins & Books »in the worksalso complete :)" "id:3000,phase:1,deny,status:403" -SecRule REQUEST_HEADERS:User-Agent "@contains- websites
" "id:3000,phase:1,deny,status:403"
-SecRule REQUEST_HEADERS:User-Agent "@contains - Block revslider Scans
- Lynda.com Course: Developing Secure WordPress Sites
- How to Monitor the WordPress Login Page
- Is it Secret? Is it Safe?
- How to Block IPs with 6G Firewall
+ More related posts »