The features of a WAF — How to hack it


A WAF can be purchased or downloaded as an open source firewall but it can equally come in hardware form. The way we configure our WAF often determines how well it keeps attackers out so today i would like to go over some of the features that a WAF can have to hopefully give you a better understanding of how you should configure yours or how you should attack the WAF you are currently facing. Configuring a WAF for stricter inspection might be wanted but we have to realise this increases the processing time of a request.