Difference between revisions of "OWASP NAXSI Project"

From OWASP
Jump to: navigation, search
 
Line 38: Line 38:
 
= Project Main Page =
 
= Project Main Page =
  
The project is currently hosted on googlecode as well, and you may find more details here :
+
The project is currently hosted on github, and you may find more details here :
http://naxsi.googlecode.com
+
https://github.com/nbs-system/naxsi
 
+
Be sure to check the wiki as well !
+
http://code.google.com/p/naxsi/wiki/TableOfContents
+

Latest revision as of 06:30, 3 September 2013

Naxsi-logo.jpg

Main

What is Naxsi?

Naxsi is an open source, high performance, low rules maintenance, Web Application Firewall module for Nginx, the infamous web server and reverse-proxy.

Its goal is to help people securing their web applications against attacks like SQL Injections, Cross Site Scripting, Cross Site Request Forgery, Local & Remote file inclusions.


The difference with most WAF (Web Application Firewalls) out there is that it does not rely upon signatures to detect and block attacks. It uses a simpler model where, instead of trying to detect "known" attacks, it detects unexpected characters in the HTTP requests/arguments.


Each kind of unusual character will increase the score of the request. If the request reaches a score considered "too high", the request will be denied, and the user will be redirected to a "forbidden" page. Yes, it works somewhat like a spam system.

Project About

PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP NAXSI Project (home page)
Purpose:
  • Naxsi (Nginx Anti Xss Sql Injection) is an open source, high performance, low rules maintenance, Web Application Firewall module for Nginx, the infamous web server and reverse-proxy.
  • Its goal is to help people securing their web applications against attacks like SQL Injections, Cross Site Scripting, Cross Site Request Forgery, Local & Remote file inclusions.
  • The difference with most WAF (Web Application Firewalls) out there is that it does not rely upon signatures to detect and block attacks. It uses a simpler model where, instead of trying to detect "known" attacks, it detects unexpected characters in the HTTP requests/arguments.
  • Each kind of unusual character will increase the score of the request. If the request reaches a score considered "too high", the request will be denied, and the user will be redirected to a "forbidden" page. Yes, it works somewhat like a spam system.
License: GPL 2.0
who is working on this project?
Project Leader(s):
Project Contributor(s):
  • Sebastien Blot
  • Antonin Le Faucheux
  • Didier Conchaudron
  • Sofian Brabez
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: View
Main links:
Key Contacts
  • Contact the GPC to report a problem or concern about this project or to update information.
current release
Please refer to github for downloads :

https://github.com/nbs-system/naxsi

last reviewed release
Not Yet Reviewed


other releases


Why it is different?

Because it works on a learning mode (read white list). Set the module in learning mode, crawl your site, and it will generate the necessary white lists to avoid false positives! Naxsi doesn't rely upon pre-defined signatures, so it should be capable to defeat complex/unknown/obfuscated attack patterns.

Project Main Page

The project is currently hosted on github, and you may find more details here : https://github.com/nbs-system/naxsi