Exercise 3.4: Troubleshooting

Objective

In this exercise we will examine the response pages, event logs and briefly look at utilizing HTTP capture tools

Task 1 - Response Pages

  1. Go to Security > Application Security > Policy > Response pages
../../../_images/image1_3_31.png
  1. Within this area you can add various response pages for different request. These pages can be modified by editing the response body. On the Default change the Response Type to “Custome Response”. This will open up the Response Body to editing.
../../../_images/image2_3_31.png
  1. Edit the Response as follows:
<html><head><title>Request Rejected</title></head><body>You have requested a site that is unavailable. Please contact customer service at 888-555-1212 and supply the following information:<br><br>Support ID: <%TS.request.ID()%><br><br><a href='javascript:history.back();'>[Go Back]</a></body></html>
  1. Click on the Show button
../../../_images/image3_3_31.png
  1. Click Save and Apply Policy. And click OK.

Note

Explore the other response pages. Observe that AJAX reponse pages are disabled by default.

  1. Open a New Incognito Window in Chrome and navigate to the Webgoat login page
  2. Try entering a sql injection.
or 1='1

You should have received a reponse page that you customized. Make note of the Support ID before moving on to the next task.

../../../_images/image4_3_31.png

Note

If you were to login to the web application again and try the SQL Injection do you think you will see a response page? What can you do to show a response?

Hint

Try enabling the AJAX reponse pages.

Task 2 - Event logs

  1. On the BIG-IP return to the Security > Event Log > Application > Requests
  2. Click on the magnifying glass and that will open the log filter. From here you can enter the Support ID you received from the preceeding task and select Apply Filter.
../../../_images/image8_3_3.png
  1. Select the alert and at the top box you will find a button to open the request in a separate tab
../../../_images/image5_3_31.png
  1. Click on Attack signature detected
../../../_images/image6_3_31.png

Observe the detected attack, the expected parameter, and what the applied blocking settings were. Also note that the signature used to block this attack has been identified. By clicking on the “i” next to the name you can get further information on the signature as well as a link to other documentation.

../../../_images/image7_3_3.png
  1. Examine the http body information. Do you see your attack?
../../../_images/image9_3_3.png
  1. Observe the Source IP, Accept Status and Support ID.
../../../_images/image10_3_3.png
  1. Close this tab and return to the BIG-IP Event Logs. Open the filter again, remove the support ID, and click on Illegal and Not Blocked. Apply Filter
../../../_images/image11_3_3.png
  1. Locate an entry and observe the Attack Type and Violation Rating
../../../_images/image12_3_3.png
  1. Observe in the top left of the log you will find the Blocking Setting that could be enabled to block this request.
../../../_images/image13_3_3.png
  1. Where would you find this setting to enable? What happens when you click on the link?
  2. Observe that the link will give you more information on which piece of HTTP Protocol Compliance will prevent this attack.
../../../_images/image14_3_3.png
  1. Navigate to Security > Application Security > Policy Building > Learning and Blocking Settings and expand HTTP Protocol Compliance failed
../../../_images/image16_3_3.png
  1. Do you see the setting that would prevent this attack? How would you enable blocking for HTTP protocol compliance?

Hint

../../../_images/image15_3_3.png