
04- Explorando o Web Application Firewall da Cloudflare
Olá Pessoal, Quer conhecer o melhor curso de pfSense no mercado? Se inscreve no treinamento Ninja PFSsense que eu criei na Udemy: https://www.udemy.com/course/ninja-pfsense/ Esta é a quarta Live sobre CloudFlare, e vamos ver o Beabá, o produto queridinho da CloudFlare, que é a proteção de firewall de aplicação web. Veremos: - Como funciona o WAF - Tipos de regras da inscrição gratuita - Bloqueando países - Até onde o plano gratuito te cobre - Como complementar o plano gratuito com mais segurança - Boas práticas --------------------------------------------------------------------------------------------------------------------------- ME SIGA TAMBÉM NAS REDES SOCIAIS 🔥 Redes Sociais: ✔ Telegram: https://t.me/RodriguesTreinamentosTI ✔ Instagram: https://www.instagram.com/rodriguestr... ✔ Página no Facebook: http://fb.me/rodriguestreinamentosdeti ✔ E-mail para contato: grodrigues.luciano@gmail.com
04- Explorando o Web Application Firewall da Cloudflare
Welcome and Overview
The speaker introduces the topic of cloudcler and provides an overview of the previous live sessions.
Cloudcler Live Sessions Recap
- The speaker recaps the topics covered in previous live sessions, including Coldplay, DNS registration, setting up a website on Cloudler, configuring security measures, and SSL certificates.
- Discussion on implementing basic security measures for websites to ensure access through Cloud Player and encrypting connections.
- Introduction to the topic of Afe da Cloud flaire (possibly a feature or service related to cloud hosting).
Enhancing Server Security with Tunnels
The speaker discusses enhancing server security using tunnels and demonstrates accessing RDP servers securely.
Enhancing Server Security
- Implementing additional layers of authentication for application protection.
- Demonstrating secure access to RDP servers via tunnels using zero trust authentication methods.
- Accessing servers through Guacamole project for secure browser-based RDP access without needing VPN configurations.
Browser-Based RDP Access
Exploring browser-based RDP access using Guacamole for convenient and secure server access.
Browser-Based RDP Access
Opening and Accessing Account
In this section, the speaker opens a tab to access an account created for live sessions.
Accessing Account
- The speaker opens a new tab to access the account created for live sessions.
Configuring Website with Cloudflare
This part discusses configuring a website with Cloudflare, including SSL certificates and security measures.
Configuring Website
- The website is configured to run through Cloudflare proxy with SSL certificate.
- Web Application Firewall (WAF) is explained as focusing on web application security aspects.
Web Application Firewall Features
This section delves into the features of Web Application Firewall compared to traditional firewalls like pfSense.
WAF Features
- WAF focuses on web-specific aspects like HTTP headers, methods, and secure headers.
Rules and Development in WAF
The discussion revolves around rules development in WAF and its association with project Apache ModSecurity.
Rules Development
- Rules in WAF are built upon the Apache ModSecurity project.
Cloudflare Free Plan Limitations
This part explains limitations of the free plan in Cloudflare regarding managed rules and available security features.
Free Plan Limitations
- Managed rules developed by Cloudflare are not accessible in the free plan.
New Section
Discusses the benefits of using Cloudflare for website security.
Benefits of Using Cloudflare
- Cloudflare offers a comprehensive set of rules to block common WordPress exploits.
- Managed rules cover various aspects like IP address, country, and autonomous system number.
- Provides conditional rules based on factors like IP address, country, and user-agent.
- Features include managing bots, flexible boot control, and protection against distributed denial-of-service attacks.
Enhancing Website Security with Cloudflare
Explores additional security features provided by Cloudflare beyond rule management.
Additional Security Features
- Customizable security configurations from global security levels to challenge settings.
- Browser integrity check and Privats support extension for enhanced security.
- Continuous session monitoring for browser integrity verification.
Creating Rules in Cloudflare
Demonstrates how to create rules within the Cloudflare platform.
Rule Creation Process
- Creating a new rule involves defining its name and conditions such as matching connections or countries.
New Section
The speaker discusses using a proxy in the United States to access websites and implementing rules to block access by country.
Proxy Setup and Country Blocking
- Using a proxy in the United States for website access.
- Implementing rules to block access by country, starting with Brazil.
- Explaining how blocking countries can reduce attacks on the website significantly.
- Discussing the strategy of having servers in different regions for scanning purposes.
New Section
The speaker explains how to identify and manipulate the host field in web requests for server access control.
Host Field Manipulation
- Demonstrating how to view network requests and filter them for specific content types.
- Explaining the significance of the host field in web requests for server access control.
- Showing practical examples of manipulating the host field for different websites.
Vamos para o próximo Essa é a regra para mim forçar O capixa tá então a gente já criou duas regras ambas que se eu tiver fora do Brasil ou eu bloqueio a conexão ou eu posso que a pessoa resolva Um Desafio Tá além disso que é mais que eu tenho aqui país continente rostinei eu posso pegar pelo endereço IP tá pode ser útil depende eu
The speaker discusses creating rules related to forcing connections based on location and IP addresses.
Creating Rules for Connection
- Two rules are established: blocking connections outside Brazil or allowing resolution of challenges.
- Example given where specific IP addresses, like office branches, can access web applications while others are blocked.
- Utilizing the HTTP request's referer field to track and control access based on referral sources.
- Demonstrating how the referer field helps track user navigation between pages and external sources.
Além disso pelo método de requisição eu posso aceitar somente conexões que estejam get ou post posso bloquear todas
The speaker explains controlling connections by accepting only specific methods like GET or POST requests.
Controlling Connection Methods
- Ability to restrict connections to GET or POST methods, useful for security measures.
- Illustration of limiting certain methods during vulnerabilities to prevent unauthorized actions.
- Blocking requests temporarily until resolving issues with API vulnerabilities.
será que eu ainda consigo ver a página principal bom deveria né consigo Ah ele vai carregar aqui pouco lento mas vai beleza carregou então eu consigo bloquear certas partes site é baseado no caminho na baseado na URL e eu posso usar tanto a URI aliás tanto o f é o caminho quanto a junção do pé com o Carrie é a parte do interrogação para frente legal além da URI que mais que eu posso
Exploring the ability to block specific parts of websites based on URLs and paths.
Blocking Website Sections
- Testing blocking access to specific pages based on URLs like login.php.
- Utilizing different components of URLs such as path, query string, and fragments for precise blocking rules.
Understanding Threat Detection and Blocking
In this section, the speaker discusses threat detection and blocking based on different access scenarios.
Access Scenarios and Threat Detection
- Accessing from a top network increases threat score.
- Proxy access can trigger threat scores, like SQL injection attempts.
- Proxy usage detected as a threat, leading to access denial.
- Security paranoia level indicated by activity monitoring.
Custom Rules for Threat Mitigation
Custom rules creation for mitigating threats and enhancing security measures.
Implementing Custom Rules
- Suggested exploring past sessions for Apache setup insights.
- Blocks traced back to Vietnam proxy; detailed block reasons in paid version.
- Detailed block information available in paid version via JSON file download.
Enhancing Security Measures with Custom Rules
Enhancing security measures through custom rules implementation for specific file types.
File Type Restrictions
- Utilizing custom rules to restrict file types like PDF or executables.
New Section
In this section, the speaker discusses setting up rate limits to control access to a website and customizing responses when limits are exceeded.
Setting Rate Limits
- Setting up rate limits with Cloudflare to restrict access based on the number of requests within a specified time frame.
- Blocking requests that exceed the set limit for a defined period, such as 10 seconds.
- Customizing responses for blocked requests by displaying personalized messages or files like JSON or XML.
New Section
This part covers testing the rate limiting functionality and observing how it affects different types of requests made to the website.
Testing Rate Limit Functionality
- Conducting multiple requests within a short timeframe to trigger rate limiting.
- Observing successful and unsuccessful request patterns during rate limiting.
- Waiting for the block period to expire before regaining access.
New Section
The speaker demonstrates how rate limiting can be beneficial in scenarios like protecting WordPress sites from excessive access attempts.
Application in WordPress Security
- Implementing rate limits to prevent unauthorized access attempts on WordPress login pages.
- Adjusting rate limit values based on specific security needs.
- Illustrating practical use cases where rate limiting enhances website security.
New Section
This segment focuses on enhancing security measures by setting restrictions on form submissions and providing customized messages for blocked attempts.
Form Submission Restrictions
- Limiting form submission attempts within a specified time frame.
- Blocking users after exceeding submission limits and displaying personalized messages.
- Enhancing user authentication processes through restriction rules.
New Section
Discussion about utilizing Cloudflare's free account features for web application security purposes, emphasizing practical applications with Apache servers.
Leveraging Cloudflare Free Account Features
- Exploring web application firewall (WAF) rules using Cloudflare's free account.
- Comparing security capabilities between Cloudflare's free services and paid options.
Cloudflare Best Practices
The speaker discusses best practices for using Cloudflare, addressing common doubts and clarifying how to make the most of its features.
Key Points
- Cloudflare provides good practices for users who are unsure about what to do within the platform.
- Users may have doubts about marking certain options or utilizing specific functions.
- It is essential to understand when to use certain features and when not to use them effectively.
Upcoming Live Session
The speaker announces a future live session and encourages viewers not to miss it for further insights on the topic discussed.
Key Points
- The speaker mentions meeting the audience at the same time and channel the next day.
- Viewers are reminded not to miss the upcoming live session scheduled for tomorrow, which will be the final one on this particular topic.
- The speaker expresses gratitude for the audience's participation in previous sessions and hopes they found them valuable.
Closing Remarks
The speaker concludes by emphasizing the importance of understanding key concepts presented in their sessions and encourages viewers' continued interest in exploring further into the subject matter.
Key Points
- Encouragement is given to grasp main ideas, understand functionality, and spark interest for deeper exploration.
- Viewers are advised to determine if content resonates with them before delving deeper into a topic.