In BlackLab WAF, plugins are the core detection units.
Each plugin focuses on identifying a specific type of attack or malicious behavior in incoming requests.
Each plugin focuses on identifying a specific type of attack or malicious behavior in incoming requests.
What is a Plugin?
A plugin in BlackLab WAF represents a self-contained detection rule or module.It analyzes HTTP requests and assigns a score (or weight) when suspicious patterns are found.
When the accumulated score of a request exceeds the configured threshold, BlackLab takes action (block, log, or run a custom callback).
Examples of Plugins
-
SQL Injection Plugin (
SqliPlugin)
Detects attempts to inject SQL commands into parameters, headers, or body. -
Cross-Site Scripting Plugin (
XssPlugin)
Identifies suspicious HTML or JavaScript injections. -
Path Traversal Plugin (
PathTraversalPlugin)
Prevents attackers from accessing files outside the intended directories (e.g.,../../etc/passwd). -
Local File Inclusion Plugin (
LfiPlugin)
Detects attempts to include local files through crafted input. -
Remote File Inclusion Plugin (
RfiPlugin)
Blocks attempts to load remote malicious scripts or files.
How Plugins Work Together
You can enable multiple plugins at the same time.Each plugin adds points when it detects something malicious.
For example: