Главная
Study mode:
on
1
Introduction
2
Christopher
3
What is iRules
4
iRules the language
5
Script example
6
Server header
7
HTTP server
8
Syntax
9
Decalogue
10
Quotes
11
Code Example
12
Exploit
13
Demo
14
Table and Table
15
Table Syntax
16
Example
17
Request
18
TMSH
19
Attack Chain
20
Unit Testing
21
Summary
22
Questions
Description:
Explore command injection vulnerabilities in F5 iRules through this 49-minute Black Hat conference talk. Dive into the world of BigIP F5 products, widely used by large corporations and governments for reverse proxy and web traffic routing. Learn about iRules, a subset of rules written in TCL-based language, and understand its syntax, structure, and potential security risks. Examine script examples, server headers, and HTTP server configurations. Discover exploitation techniques, including table syntax manipulation and TMSH attack chains. Gain insights into unit testing for iRules and understand the importance of secure coding practices in high-performance network environments. Conclude with a summary of key takeaways and participate in a Q&A session to deepen your understanding of iRules security.

Command Injection in F5 iRules

Black Hat
Add to list
0:00 / 0:00