Linux 软件免费装
Banner图

Counterespionage Firewall

开发者 floodspark
更新时间 2022年7月19日 13:46
捐献地址: 去捐款
PHP版本: 7.0.33 及以上
WordPress版本: 6.0.1
版权: GPLv2 or later
版权网址: 版权信息

标签

security bots fraud intelligence cybersecurity espionage recon reconnaissance intel defense hackers

下载

1.5.2 1.5.0 1.5.1 1.6.0

详情介绍:

Floodspark Counterespionage Firewall (CEF) helps you block reconnaissance or otherwise illegitimate traffic. CEF is like a web application firewall (WAF) but protects against intelligence gathering. CEF focuses on pre-attack protection and is designed to complement security plugins such as Wordfence or Sucuri. CEF can:

屏幕截图:

  • Deceiving WPScan's username hunting. Real usernames were "admin", "admin2", "admin3", "admin4", "admin5". No hacker can log in with these faked usernames because they don't actually exist.
  • Defeating WPScan's plugin scan
  • Defeating WPScan's theme scan
  • Error message the visitor will receive for banned behavior or devices.
  • Defeating hackertarget.com's WordPress username enumeration scan
  • Recommended setting for Endurance Cache / Endurance Page Cache to avoid issues

升级注意事项:

1.5.0 We tripled CEF's WordPress-specific defenses to include plugin and theme scanning protection on top of username protection. 1.4.0 CEF now hides your real usernames from hackers. Read about this unique approach on our blog 1.3.0 CEF now fakes the most current version of PHP to throw off attacker intelligence gathering. 1.2.0 Additional detections are included in this release. Also a message will appear for blocked users. 1.1.0 Additional detection implemented and a bug fix. 1.0 Initial public release

常见问题:

How can I test CEF's protection?

Use the Docker version of WPScan and the commands below. When prompted whether to update the database, you shouldn't need to.

  • To verify that CEF deceives WPScan's username scan, issue the following command: docker run -it --rm wpscanteam/wpscan --url http://[yourbloghere.com] --enumerate u
  • To verify that CEF deceives WPScan's plugin scan, issue the following command: docker run -it --rm wpscanteam/wpscan --url http://[yourbloghere.com] --plugins-detection aggressive
  • To verify that CEF deceives WPScan's theme scan, issue the following command: docker run -it --rm wpscanteam/wpscan --url http://[yourbloghere.com] --enumerate t

Does CEF replace a Web Application Firewall (WAF)?

No. CEF and was specifically designed to leave protection against active web attacks to WAFs, which do it best.

Does CEF replace a host firewall?

No. CEF specializes in web-type intelligence and leaves the protection of other services to the host firewall.

Should I keep my WAF and host firewall?

Yes.

Why use CEF then?

CEF helps you earlier in the cyber-attack chain, during the Reconnaissance stage, to disrupt malicious research efforts. Remember, attacks do not necessarily correlate with the research origin(s).

What is an Intent Indicator?

An Intent Indicator is a trait derived from cyber threat intelligence that with high confidence indicates malicious intent. You do not need to activate every Intent Indicator powering CEF if for some reason one or more break your business traffic. E.g. A bank may want to block visitors using Tor to reduce fraud, while an online newspaper may recognize that readers and journalists have an interest in using Tor to avoid censorship and retribution.

How is an Intent Indicator different than an Indicator of Compromise (IoC)?

BLUF: An Intent Indicator is earlier than an IoC. An IOC indicates that a breach already took place, allowing you only to respond after the fact. Intent Indicators are the attacker’s traits, or Tactics, Techniques, and Procedures (TTPs), observable during the recon phase--traits, that with high confidence, would not belong to legitimate visitor traffic and behavior.

更新日志:

1.5.2 1.5.1 1.5.0 1.4.0 1.3.0 1.2.0 1.1.0 1.0