This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Projects/OWASP NAXSI Project"

From OWASP
Jump to: navigation, search
 
(13 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{{Template:<includeonly>{{{1}}}</includeonly><noinclude>Project About</noinclude>
 
{{Template:<includeonly>{{{1}}}</includeonly><noinclude>Project About</noinclude>
| project_name = OWASP NAXSI Project (Nginx Anti Xss Sql Injection)
+
 
 +
| project_name = OWASP NAXSI Project  
 +
 
 
| project_home_page = OWASP NAXSI Project
 
| project_home_page = OWASP NAXSI Project
| project_description =  
+
 
| project_license =
+
| project_description = *Naxsi (Nginx Anti Xss Sql Injection) is an open source, high performance, low rules maintenance, Web Application Firewall module for Nginx, the infamous web server and reverse-proxy.
| leader_name[1-10] =
+
 
| leader_email[1-10] =
+
*Its goal is to help people securing their web applications against attacks like SQL Injections, Cross Site Scripting, Cross Site Request Forgery, Local & Remote file inclusions.
| leader_username[1-10] =  
+
 
| contributor_name[1-10] =  
+
*The difference with most WAF (Web Application Firewalls) out there is that it does not rely upon signatures to detect and block attacks. It uses a simpler model where, instead of trying to detect "known" attacks, it detects unexpected characters in the HTTP requests/arguments.
| contributor_email[1-10] =  
+
 
| contributor_username[1-10] =  
+
*Each kind of unusual character will increase the score of the request. If the request reaches a score considered "too high", the request will be denied, and the user will be redirected to a "forbidden" page. Yes, it works somewhat like a spam system.
 +
 
 +
 
 +
| project_license = [http://www.gnu.org/licenses/gpl-2.0.html GPL 2.0]
 +
 
 +
| leader_name1 = Thibault "bui" Koechlin
 +
| leader_email1 =  bui@nbs-system.com
 +
| leader_username1 = Thibault Koechlin
 +
 
 +
| contributor_name1 = Sebastien Blot
 +
| contributor_email1 =
 +
| contributor_username1 =
 +
 
 +
| contributor_name2 = Antonin Le Faucheux
 +
| contributor_email2 =
 +
| contributor_username2 =
 +
 
 +
| contributor_name3 = Didier Conchaudron
 +
| contributor_email3 =  
 +
| contributor_username3 =
 +
 
 +
| contributor_name4 = Sofian Brabez
 +
| contributor_email4 =  
 +
| contributor_username4 =  
 +
 
 
| pamphlet_link =  
 
| pamphlet_link =  
 +
 
| presentation_link =
 
| presentation_link =
| mailing_list_name =  
+
 
| project_road_map =  
+
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-naxsi-project
| links_url[1-10] =  
+
 
| links_name[1-10] =
+
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_NAXSI_Project/Roadmap
| release_1 =  
+
 
| release_2 =
+
| links_url1 = https://github.com/nbs-system/naxsi
| release_3 =
+
| links_name1 =Naxsi's at github
| release_4 =
+
 
 +
 
 +
 
 
<!--- The line below is for GPC usage only. Please do not edit it --->
 
<!--- The line below is for GPC usage only. Please do not edit it --->
 
| project_about_page = Projects/OWASP NAXSI Project
 
| project_about_page = Projects/OWASP NAXSI Project
  
 
}}
 
}}

Latest revision as of 11:32, 3 September 2013

PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP NAXSI Project (home page)
Purpose:
  • Naxsi (Nginx Anti Xss Sql Injection) is an open source, high performance, low rules maintenance, Web Application Firewall module for Nginx, the infamous web server and reverse-proxy.
  • Its goal is to help people securing their web applications against attacks like SQL Injections, Cross Site Scripting, Cross Site Request Forgery, Local & Remote file inclusions.
  • The difference with most WAF (Web Application Firewalls) out there is that it does not rely upon signatures to detect and block attacks. It uses a simpler model where, instead of trying to detect "known" attacks, it detects unexpected characters in the HTTP requests/arguments.
  • Each kind of unusual character will increase the score of the request. If the request reaches a score considered "too high", the request will be denied, and the user will be redirected to a "forbidden" page. Yes, it works somewhat like a spam system.
License: GPL 2.0
who is working on this project?
Project Leader(s):
Project Contributor(s):
  • Sebastien Blot
  • Antonin Le Faucheux
  • Didier Conchaudron
  • Sofian Brabez
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: View
Main links:
Key Contacts
current release
  1. REDIRECT Projects/OWASP NAXSI Project/Releases/Naxsi-alpha-v0.43
last reviewed release
Not Yet Reviewed


other releases